Forthcoming papers have been accepted for publication at the Communications of the Association for Information Systems and are listed below in order of acceptance date. Copies of unedited manuscripts can either be obtained by clicking the manuscript title or contacting the corresponding authors listed below.
Note that the decision to provide a copy rests with the authors, not with the Communications of the Association for Information Systems.
The manuscripts listed here will undergo copyediting, typesetting, and review of the resulting proofs before they are published in their final form. During the production process errors may be discovered, which could affect the content. All legal disclaimers that apply to the Communications of the Association for Information Systems pertain. For a definitive version of the works listed here, please check for their appearance online at http://aisel.aisnet.org/cais/.
Information Systems Development as Value Co-Creation
Kautz, Karlheinz (email@example.com)
In this research we investigate information systems development (ISD) as value co-creation and how co-creation as an ISD approach is performed. For this purpose, we present a case study in a not-for-profit, intergovernmental environment of an ISD project of a digital game, which has the objective to raise attention concerning climate change. The project had limited resources and was performed with a number of youth utilizing a social media platform. Our study uses a taxonomic framework for Web-based co-creation, which originally was developed for a commercial context and has not been empirically validated before. Our study shows that the taxonomic framework also provides an in-depth comprehension of the project as value co-creation in a not-for-profit environment especially with regard to co-creators’ motivation and the types of value they created. We further discuss the findings of our study in reference to information systems (IS) literature on service innovation. This literature contributes to additional explanation and understanding what value co-creation is and how it can be performed as an instance of ISD practice. On this background, we offer some propositions for how future ISD research could benefit from adopting a value co-creation perspective. Although derived from a specific project in a particular setting we argue the two approaches combined can thus be used for (1) preparing any co-creation project (2) coping with co-creation during the development process by providing an understanding of co-creation as an approach to ISD; and (3) for after-the-fact reflection and understanding to derive some lessons learnt. While further empirical validation is needed for this claim we contribute to insight into co-creation in ISD with respect to participatory approaches to ISD beyond conventional environments, roles and types of participants and contributors.
Advancing Data Monetization and the Creation of Data-based Business Models
Rossi, Matti (firstname.lastname@example.org)
Although big data has been under discussion for years, research thus far has scarcely touched on directly selling and monetizing data assets. This aspect is of particular relevance given recent concerns about data privacy and security and the simultaneous explosion in the use of data for marketing and service-development purposes. In this paper we describe an empirical study on companies’ initiatives concerning the selling and monetization of data. We categorize the relevant business models based on the dimensions of their customer refinement and their scalability. The research reveals a number of constraints (organization type, business type, data characteristics, privacy, and security) that companies should address to move from the internal use of data and supporting existing customers to generating new business through selling data. Based on the findings, we propose for practitioners’ ways of benefiting from the data. For researchers, we provide directions for future studies that include developing strategies that foster compliance between companies’ aspirations and consumer and societal restrictions and facilitate data-based innovation and revenue generation.
Paul, Jomon A. (email@example.com)
The potential impact of social media abetted by the exponential growth in the number of applications and platforms to engage online on social issues such as political discourse, social segregation, and academics has raised valid concerns among researchers. Availability of a valid instrument to measure an individual’s social media activity in facilitating a thorough investigation of these profound issues would be indispensable. We design, deploy, and validate a new survey instrument focused on social media activity. Our goal is to test the validity of the model from various perspectives (internal, construct, convergent, etc.) in the pursuit of creating a reliable instrument for researchers. A distinctive feature of this instrument is that it draws from the Theory of Planned Behavior and Social Identity theory, thereby providing a strong theoretical underpinning to dimensions of social media activity. Our results demonstrate our instrument to have reliability and discriminant validity.
Understanding the Whistle-Blowing Intention to Report Breach of Confidentiality
Ho, Shuk Ying (firstname.lastname@example.org)
Our study examines the factors that encourage employees to whistle-blow wrongdoings in relation to confidentiality breach. We investigate how the evolution of anticipated regrets of remaining silent changes their whistle-blowing intentions, and the moderation of employee characteristics and organizational policies on this relationship. Drawing on attribution theory, we develop three hypotheses. Our experiment findings show that: (1) employees’ perceptions of the controllability and intentionality (but not stability) of the wrongdoing act affect the evolution of their anticipated regret; (2) anticipated regret increases employees’ whistle-blowing intentions; (3) the effect of anticipated regret on whistle-blowing intentions is stronger when organizations implement policies to promote protection of information confidentiality; and (4) employees who are equipped with information technology knowledge have a stronger intention to whistle-blow. Theoretically, our study extends the focus of the organization security literature to individuals’ whistle-blowing and highlights an IS research agenda around whistleblowing in relation to confidentiality breach. Practically, it informs organizations about how to encourage employees to whistle-blow when they observe breach of confidentiality.
Using Secondary Data to Tell a New Story: A Cautionary Tale in Health Information Technology Research
Petter, Stacie (email@example.com)
Through the growth of big data and open data, new opportunities have presented themselves for information systems (IS) researchers seeking to investigate phenomena that are difficult to study using primary data. As a result, many scholars are ‘retooling’ their skills to leverage the large amount of secondary data that is readily available for analysis. In this confessional account, we share the story of how two of the authors faced challenges when using secondary data for a research project within the domain of health information technology. Through additional analysis of the literature on health information technology that used secondary data, we identified several themes of potential pitfalls that can occur when collecting, appropriating, and analyzing secondary data for a research project. We share these themes, as well as exemplars, to help IS researchers that are new to using secondary data avoid the mistakes we made in our first attempt of using secondary data.
Robust Action Strategies in a Connected, but Unequal World: Revisiting American Pragmatism for Social Justice-Focused Research in Information Systems
Levy, Matt (firstname.lastname@example.org)
This article elucidates Robust Action as a research framework for the Information Systems (IS) discipline. We contend Robust Action provides a suitable frame to conduct Pragmatist research in IS and can be useful in researching the multi-faceted terrain of social justice. The Robust Action frame is rooted in Pragmatism, and moreover, given the history of American Pragmatism as rooted in Social Justice, Robust Action can provide a suitable frame to confront broad-scale issues on a societal scale, of which there is currently very little research in the IS discipline. The article defines the components of Robust Action, illustrates its philosophical rooting in the Pragmatist tradition, and provides an example of how Robust Action can be used.
van der Poll, Arthur (email@example.com)
There has been a clarion call for the decolonization of South African universities. Decolonization focuses on the dismantlement of Western epistemological traditions and practices entrenched in the university culture and knowledge domains. In this paper, we explore decolonization as a site of struggle in national institutions of higher learning, not only politically, but also epistemologically. More specifically, we examine how the Africanization of Computing education is governed by hegemonic and neoliberal policies that work to the detriment of decolonization and indigeneity. We conclude with critical recommendations that can support Computing departments and faculties in enriching the syllabus with indigenous knowledge.
Image or Text: Which One is More Influential? A Deep Learning Approach for Visual and Textual Data Analysis in the Digital Economy
Song, Jaeki (firstname.lastname@example.org)
In a digital economy, different types of information about products communicate the product’s quality and characteristics to prospective consumers. However, it is still unclear which type of information plays the most important role in individuals’ decision-making processes. In this study, we explore the effects of unstructured data and the importance of congruence between textual and visual data in consumers’ purchase decisions. We apply a deep neural network model to rank the importance of different types of information and use a regression model to investigate the impact of information consistency on sales predictions. Based on the empirical analysis, we find that both image-based and text-based information influence consumers’ purchase decisions, but the former is more important for ‘search goods’, whereas the latter is more influential for ‘experience goods’. Furthermore, congruence between image- and text-based information is positively associated with purchase decisions, indicating that information congruence impacts products’ sales performance in the digital economy. This study demonstrates how to apply advanced deep learning techniques to measure the congruence between information of different types.
Subramanian, Hemang (email@example.com)
Blockchain is one of the 21st century’s most impactful inventions. In addition to creating cryptocurrencies such as Bitcoin, this technology enables smart contract functionality and supports decentralized, secure and private transactions. Blockchains by design, enable decentralized functionality for many of today’s business applications resulting in the transformation of traditional centralized information systems. This paper summarizes four research areas of interest to IS scholars, that were discussed in a panel at AMCIS 2018, namely, a) cryptocurrency regulation b) Etherisc - a smart contract-based application, c) decentralized blockchain applications in healthcare, and, d) Bitcoin as a blockchain application and issues with decentralization. To account for the European Union’s General Data Protection Regulation’s requirements to provide persons with the Rights to be Forgotten and Modify Personal Data, we modified the Pedersen et al.(2019) framework to accommodate off-chain data storage requirements. We deployed the modified Pedersen et.al. (2019) framework to evaluate the suitability of the use of blockchains for the three different applications. We summarize the research questions and present a research agenda that emerged from the issues highlighted during the panel discussion.
A Great Escape: The Effect of Negative Public Affiliation on Belongingness in Virtual Communities
Thatcher, Jason Bennett (firstname.lastname@example.org)
In this study, we study negative public affiliation, which we define as discomfort with being publicly linked to a potentially socially stigmatized group or interest. We investigate how users who feel negative public affiliation form feelings of belonging to a virtual community. We also consider the impact of brand congruity (how much a user identifies with an interest or brand) on feelings of belonging. To investigate negative public affiliation, we drew a sample from members of Twilight-themed virtual communities and evaluated the interrelationship between negative public affiliation, brand congruity, and belongingness (how well users feel they fit within virtual communities). Our results indicate that high negative public affiliation and high brand congruity with Twilight positively impacted feelings of belonging: users who felt Twilight reflected their identity but felt uncomfortable publicly discussing their interest felt a stronger sense of belonging in relation to their virtual communities. Our study offers practical implications for firms seeking to design and maintain virtual communities that support the broadest possible group of users. Of equal importance, our study provides a new direction for information systems research on virtual communities, suggesting a need to study users who participate in socially uncomfortable, stigmatized, or unacceptable communities.
Concerns and Trade-Offs in Information Technology Acceptance: The Balance between the Requirement for Privacy and the Desire for Safety
Ulrich, Frank (email@example.com)
This paper constructs a new model of motivation by bridging Self-determination theory (SDT) with the unified theory of acceptance and use of technology (UTAUT). Using an explorative approach, we study how human motivational determinants influence the trade-off between safety and privacy in technology acceptance. We take the Scandinavian healthcare context as our empirical outset by exploring how older Danish adults perceive sensor-based E-health monitor technology that is designed to monitor their health status. Danish municipalities aim to use these technologies to identify early warning signs and thereby improve the quality of care and life by making people more self-reliant and reducing unnecessary hospitalization. However, ethical issues concerning privacy versus safety need to be taken into consideration when implementing these technologies. After monitoring 21 respondents (mean age: 85) living independently at home over 9 weeks, we interviewed them about their concerns regarding privacy and safety. Our findings show that the respondents were willing to compromise their privacy if their autonomy and personal integrity were respected and if the benefits of sensor-based monitoring outweighed health-related threats. We used these findings and the theoretical outset to create a novel model that takes human motivation into account when using UTAUT.
Determinants and Success Factors of IT Outsourcing in the Public Sector
Gantman, Sonia (firstname.lastname@example.org)
Public organizations often turn to the private sector for guidance and best practice examples when faced with technological or organizational change. However, private-sector business practices do not always translate neatly into the government domain. In this study, we analyze data from eighty-two collaborative projects in the public safety domain with the goal to establish whether public sector ITO practices match practices that have been documented in the private sector, focusing on the ITO decision process components and outcomes that have been identified as challenging for public sector ITO. Results show that (1) expertise gaps and cost considerations are the leading driver of ITO adoption; (2) availability of capital funding affects ITO decisions; (3) complex systems are outsourced more often; (4) there are multiple successful ITO configurations; and (5) like the private sector, knowledge sharing and involving the vendor in requirements definition are important factors for ITO success in public organizations. Our descriptive, exploratory study extends previous ITO research by providing a framing for the fragmented literature on ITO in the public sector and laying a foundation for more systematic and theory-based scholarship. Our observations will also guide governmental practitioners in their sourcing decisions.
Artificial Intelligence Meets IS Researchers: Can It Replace Us?
Loebbecke, Claudia (email@example.com)
In the era of accelerating digitization and rapid advances in Artificial Intelligence (AI), increasingly more job tasks may be automated by AI. However, there is little critical analysis of how this will happen, if at all, and to what kind of professions to greater or lesser extents. A few studies suggest that highly creative and knowledge-intensive tasks cannot be substituted by AI. Yet, there have been examples of creative art pieces generated by AI algorithms that even art critics could not distinguish from human-drawn paintings. As IS (and most other) researchers, we pride ourselves on the scarcity, novelty, and creativity of our work. In this context, this panel debated the critical question for IS academics –whether AI can and will replace our major activity, IS research, – or even us IS researchers.
Integrating Explanatory/Predictive and Prescriptive Science in Information Systems Research
Seidel, Stefan (firstname.lastname@example.org)
The scholarly Information Systems (IS) field has a dual role. As an explanatory and predictive science, the field contributes to the understanding of the pervasive IS that shape the digital age and in some cases allows to make predictions about those phenomena. As a prescriptive science, it participates in the creation of IS-related innovations by identifying means-ends relationships. The two can beneficially interact, for instance, when explanatory theory can be turned into prescriptions, or when applicable knowledge produces explanatory insights. In this commentary, we contribute to integrating these two roles by proposing a framework to help IS researchers navigate the field’s dualism to extend the cumulative scholarly knowledge created by IS in terms of justified explanations and predictions as well as justified prescriptions. The process we describe is based on ongoing, dynamic, iterative, and interrelated research cycles. We identify a set of integrative research practices that occur at the interface between explanatory/predictive and prescriptive research—the explanation-prescription nexus. We derive guidelines for IS research.
Storey, Veda C. (email@example.com)
“Exhaust data” is “extra data” or “left over” data from “core data” digital transactions, collected, either intentionally or unintentionally, but for which there is no initial, specific purpose for its collection. This article differentiates core data from exhaust data, defines and describes exhaust data, and proposes how to turn it into core data to provide value for firms. We present a framework for discovering and transforming exhaust data and apply it to four case studies involving Internet search data, accounting entries and data security, social media disclosures, and Edgar use logs. From the cases, we extract five managerial challenges and generate five recommendations to help managers identify exhaust data applications for realizing potential value.
An Extended TOE Framework for Cybersecurity Adoption Decisions
Wallace, Steven A. (firstname.lastname@example.org)
High-profile incidents, such as the 2019 Capital One data breach and the 2017 Equifax breach, have engendered doubts about firm trustworthiness, resulting in cybersecurity becoming a critical risk factor firms must address. Breaches can precipitate extreme consequences for managers, shareholders and customers of the affected firm. Unsurprisingly, data breaches are the biggest concern of IT leaders. This field study uses a qualitative approach by interviewing C-Level executives and IT consultants. With the use of semi-structured interviews, we investigate cybersecurity concerns and influencers of adoption decisions for cybersecurity. We find that the traditional Technology Organization Environment (TOE) framework does not fully capture the range of issues in the cybersecurity context and therefore propose a new extended TOE framework that is specific to cybersecurity adoption decisions. This extended framework includes new dimensions, cyber catalysts and practice standards, as well as new factors under the traditional dimensions of technology, organization, and environment.
Missing Impact of Ratings on Platform Participation in India: A Call for Research in G. R. E. A. T. Domains
Karhade, Prasanna P. (email@example.com)
The objective of this study is to propose that research conducted in western, educated, industrialized, rich and democratic (W.E.I.R.D.) domains does not necessarily generalize to the rest of the world. Growing, rural, eastern, aspirational, transitional (G.R.E.A.T) domains now account for a significant proportion of world economic output, thereby warranting special attention. We submit that a tolerant stance under which scholars investigate G.R.E.A.T. domains with an open mind that allows for theoretical plurality is likely to enrich IS theories. As an exemplar of this stance, we consider how online ratings affect ratee decisions to participate in financial transactions on a digital platform in a G.R.E.A.T. economy. The production and consumption of food affects every strata of society and thus, we choose to investigate our research question in the context of platform-enabled food delivery. We apply decision tree induction on a population level dataset of restaurants, their features, online ratings, and financial participation decisions from a major food discovery and delivery platform in India. Tree induction makes no distributional assumptions and makes no a priori assumptions on the combinations of factors, thereby enabling us to put forth the most lenient test for uncovering any impact of online ratings on the decisions tacitly made by ratees. After conducting multiple computational experiments, we consistently find that online restaurant ratings did not have a significant bearing on their decision to participate on the food delivery platform. Our counterintuitive finding serves as an exemplar of a W.E.I.R.D. domain logic that does not generalize to a G.R.E.A.T. domain and forms a credible basis for our call for additional research in G.R.E.A.T. domains.
Myers, Michael D. (firstname.lastname@example.org)
This article is based on a panel discussion at the 2019 International Conference on Information Systems (ICIS) held in Munich, Germany. This panel was concerned with the ethics and politics of engagement with Indigenous peoples in information systems research. As members of a research team that have been studying the use of social media by Indigenous peoples to collaborate and further their cause, we have recently become aware of some of the unintended consequences of IS research. Since others could easily appropriate our findings for political purposes, we believe that we as IS researchers need to become more sensitive to the ways in which we study and engage with “the Other.” Hence, the panelists discussed and debated the nature and extent of a researcher’s engagement when studying Indigenous peoples and their uses of IS/IT. The panel, chaired by Michael Myers, included three panelists who have been studying Indigenous peoples’ use of social media (Liz Davidson, Amber Young and Hameed Chughtai), and one panelist who is an Indigenous scholar studying Indigenous theories in IS (Pitso Tsibolane).
Measuring Implicit Attitude in Information Systems Research with the Implicit Association Test
Serenko, Alexander (email@example.com)
IS research has primarily focused on explicit perceptions, attitudes, and intentions of which users are largely aware. In this tutorial, we argue that this is a narrow view and present the concept of implicit attitude, defined as a stable subconscious evaluation of an IS that is developed a-priori, stored in memory, and triggered with limited or no awareness and intentional effort when users are exposed to system-related stimuli. We further discuss the theoretical aspects of implicit attitude toward IS and document a set of guidelines regarding a technique for implicit attitude measurement – the Implicit Association Test (IAT). We further present an overview of the FreeIAT software package and offer a practical example and configuration of the IAT including its administration and scoring. Overall, this tutorial builds methodological foundations for future inquiries into the role of implicit attitude in IS research.
Evaluating Topic Modeling Interpretability Using Topic Labeled Gold Standard Sets
Palese, Biagio (firstname.lastname@example.org)
The paucity of rigorous evaluation measures undermines topic modeling results’ validity and trustworthiness. We contribute by advancing a method for model selection when the researcher’s objective is to assess the human interpretability of the identified topics. We show how to evaluate the performance of different topic models using gold standard sets labeled by humans. Our approach ensures that the topics extracted algorithmically from an entire corpus are in line with the themes humans would have identified in the same set of documents. By doing so we combine the advantages of human coding for topic interpretability with the analytical efficiency and scalability of algorithmic topic modeling. We demonstrate it is possible to rigorously identify optimal model parametrizations for maximum interpretability and to rigorously justify model selection. We also contribute three open access gold standard sets in the context of hotel reviews and make them available so other researchers can use them to benchmark their models or validate their results. Finally, we showcase a methodology for the design and development of gold standard sets for topic modeling validation. Such a methodology can be used by scholars interested in developing gold standard sets in domains and contexts appropriate for their research.
Magnusson, Johan (email@example.com)
Forty years ago, Bo Hedberg and Sten Jönsson proposed the notion of semi-confusing information systems as a desired state for organizations operating in dynamic environments. Core to the idea was that mere efficiency is not enough for long-term success, but that organizations also require a certain amount of inefficiency. These ideas resonate within the growing literature on organizational ambidexterity, in which the dynamic balancing of exploration and exploitation is deemed a prerequisite for long-term performance. This study utilizes the design characteristics of semi-confusing information systems as a lens for secondary analysis of a case of new product development in a global, automotive organization. The findings show that inefficiencies in the new product development process correspond to the proposed design characteristics of semi-confusing information systems, opening up for a new take on the role of inefficiencies in the enactment of ambidexterity. The identified inefficiencies are manifested in unsanctioned repertoires which result in increased variety. In addition, the level of compliance with semi-confusing information systems characteristics is found to impact both the ambidextrous balance and the decentralization of the enactment of ambidexterity.
O'Leary, Kevin (firstname.lastname@example.org)
Distributed collaboration has become increasingly common across many domains, ranging from software development, to information processing, to the creative arts, to entertainment. At the time of writing, the adoption of Distributed Collaboration has thrust into the limelight as organizations across the globe are forced to work from home due to the COVID-19 pandemic. However, researchers have applied a myriad of terms to define these operations, we first addressed this issue by developing a definition of Distributed Collaboration which is representative of all its forms. Existing research has identified several factors that contribute to the success of Distributed Collaborations. Yet these factors are typically discussed in modular theoretical terms, meaning researchers and practitioners often struggle to identify and synthesize literature spanning multiple domains and perspectives. This research performs a systematic literature review to bring together core findings into one amalgamated model. This model categorizes the contributing factors for Distributed Collaboration along two axes (i) whether they are social or material (ii) whether they are endemic or relational. The relationships between factors is also explicitly discussed. The model further links these contributing factors to different collaborative outcomes, specifically mutual learning, relationship building, communication, task completion speed, access to skilled personnel, and cost savings.
Drechsler, Katharina (email@example.com)
The paper presents the report of a Professional Development Workshop (PDW) that addressed questions at the intersection of digital innovation and digital transformation at ICIS 2019 in Munich, Germany. The PDW was designed to share insights into (a) the current state of research on digital innovation, (b) the current state of research on digital transformation, and (c) the methodological and theoretical challenges in conducting research on digital innovation and/or digital transformation. Accordingly, the PDW featured three keynotes on digital innovation and digital transformation as a basis for interactive roundtable discussions where ongoing research projects presented by accepted author groups were discussed. Across the three keynotes and the roundtable discussions, some common patterns emerged. In particular, reoccurring themes included the challenge of balancing new and old elements of organization and technology in digital innovation and transformation as well as methodological challenges related to empirical research design and choice of theories. In this paper, we present a synthesis of ideas developed prior to, during, and after the PDW. This synthesis also results in a couple of suggestions for future research.
Krotov, Vlad (firstname.lastname@example.org)
Automatic retrieval of data from the Web (often referred to as Web Scraping) for industry and academic research projects is becoming a common practice. A variety of tools and technologies have been developed to facilitate Web Scraping. Unfortunately, the legality and ethics of using these tools for collecting data are often overlooked. Failure to pay due attention to these aspects of Web Scraping can result in serious ethical controversies and lawsuits. This paper reviews legal literature together with the literature on ethics and privacy to identify broad areas of concern together with a list of specific questions that need to be addressed by researchers and practitioners engaged in Web Scraping. Reflecting on these questions and concerns can potentially help the researchers decrease the likelihood of ethical and legal controversies in their work.
Baiyere, Abayomi (email@example.com)
The Internet of Things (IoT) is emerging as an integrated set of digital innovations with the potential to unleash unprecedented opportunities as well as to create significant challenges from both technological and societal perspectives. The emergence of IoT heralds a new dimension of a digital era with impact and influence that are not yet fully clear. This signals the opening of valuable opportunities for scholarly inquiries, particularly for information systems (IS) scholars. We posit that, as the IS discipline sits at the intersection of technical, business, and social applications of IT, which are also the essential dimensions of the impact of IoT, IS scholars are well positioned to understand and contribute to advancing research on this new topic and associated phenomena. This paper outlines the distinctive attributes of IoT and their implications for existing traditions of IS research. It further highlights some illustrative research perspectives from which IoT can be studied by IS scholars. We highlight a research agenda for IS in two different ways: first, by suggesting four categories of implications on IS research: (1) introduction of the physio-digital continuum; (2) multi-level exploration of IS; (3) composite affordances; and (4) heterogeneity; and second, by introducing four thematic impact domains: (1) impact on organizations; (2) impact on technology; (3) impact on individuals; and (4) impact on society.
Emergent Customer Team Performance and Effectiveness: An Ex-Post-Facto Study of Cognition and Behavior in Enterprise Systems Implementation
Bellini, Carlo (firstname.lastname@example.org)
The implementation of enterprise systems usually involves a partnership between the customer organization’s internal team and an external team formed by the technology supplier and business consultants. On both sides, team performance (a process) and team effectiveness (an outcome) emerge partly due to the unpredictable effects of the interaction of human factors at the individual level. This means that a team’s dynamics and achievements may not fully correspond to its members’ individual characteristics—for instance, a modest team may be formed by outstanding individuals, and an outstanding team may be formed by modest individuals. With an ex-post-facto approach and a case study of a successful ERP customization project, we studied the interaction effects of human factors (here represented by cognition and behavior) leading to team performance and effectiveness. Moreover, we focused on the customer side of teamwork due to gaps identified in the literature. Individual team members in our study did not score the highest in several cognitive and behavioral measures, thus we conclude that a high-performance, effective team does not necessarily possess a theoretically ideal cognitive and behavioral archetype. This study further contributes to the ambiguous debate on performance and effectiveness, their emergent nature, and the role of team management.
OASIS 2019 Panel Report: A Glimpse at the ‘Post-Digital’
Müller, Benjamin (email@example.com)
The discipline of Information Systems (IS) has been concerned with the nature of digitalization processes since a long time. Currently, there is substantial hype around the opportunities offered by digital technologies. But what can IS expect from an apparently near ‘post-digital’ era, when ‘the digital’ becomes so ubiquitous that it is no longer seen as worthy of separate attention? Our paper summarizes a panel discussion addressing this question at the 2019 OASIS pre-ICIS workshop organized by the Working Group 8.2 of the International Federation for Information Processing (IFIP). Spurred by a deliberatively provocative theme, the panelists discuss the implications of a shifting focus in research and policy from phenomena that become digital to those that are simply being digital. While the panelists agreed that there is no widely accepted vision of what the ‘post-digital’ might entail, they all problematized the digitalization rhetoric from different, complementary perspectives. Their discussion highlights the invisibilities that are surfaced by digitalization initiatives, the socio-ethical consequences of future technologies for work and organizing, and finally questioning the methodological apparatus that IS scholars need to investigate a still largely uncharted terrain. We present the summary of our panel in the hope of eliciting further discussion on these pressing concerns for the IS discipline.
Integrating Across Sustainability, Political, and Administrative Spheres: A Longitudinal Study of Actors’ Engagement in Open Data Ecosystems in Three Canadian Cities
Corbett, Jaqueline (firstname.lastname@example.org)
Over the last decade, cities around the world have embraced the open data movement by launching open data portals. To successfully derive benefits from these initiatives, engagement from a wide range of individual and organizational actors is needed. These actors undertake activities supporting data publication and dissemination within open data ecosystems. We aim to enhance the IS community’s contribution to the open data movement by conducting a longitudinal, qualitative archival analysis of open data initiatives in three Canadian cities: Edmonton, Toronto, and Montreal. Combining two complementary models of open data and information ecosystems, we explore how actors engage within and across the sustainability, political, and administrative spheres to influence the success of open data initiatives. Our findings suggest most actors operate within a single sphere, but some are able to integrate across two or all three spheres to become ecosystem anchors. Through these sphere-spanning efforts, ecosystem anchors help to shape the evolution of open data initiatives. This research provides a theoretically grounded explanation of processes within successful open data initiatives and suggests new directions for practice.
Zhao, Yu (email@example.com)
This study investigated the relationship between the occupational culture of information technology (IT) personnel and knowledge sharing in organizations. It was suggested that knowledge sharing among IT personnel and business end-users was affected by some elements of IT occupational culture. Drawing upon cultural psychology, the study presented one possible approach through which IT occupational culture manifested through six elements of organizational structure, stories, symbols, power structures, control systems, and rituals and routines and affected the knowledge sharing process. In doing so, behaviors related to knowledge sharing and IT diffusion in organizations were better understood beyond the limitations of previous IT diffusion studies.
Davazdahemami, Behrooz (firstname.lastname@example.org)
Today, people spend many hours each day on social networking activities, through which they share a great deal of information with others. Prior research has shown that unlike many other online contexts (e.g., e-commerce), users of social networking sites (SNSs) tend to share their personal information almost irrespective of their concerns for information privacy (CFIP). It has raised the question that do people really care for their privacy in SNSs? In this study, by developing a new conceptual model, based on privacy calculus theory, and testing it using a scenario-based survey (N=180), we discuss that the inconsistency reported in the literature (i.e., information sharing in SNSs in the presence of CFIP) is mainly due to lack of proper conceptualization and operationalization of models in those studies. Our results show that prior research widely lacks parallelism between the operationalization levels of CFIP and willingness to share information. Moreover, we show that situational factors such as sensitivity of information and perceived control over privacy play a critical role in explaining the decision-making mechanism for information disclosure in SNSs.
Cybersecurity of Cyber-Physical Systems (CPS) – State of the Art and Research Opportunities for Information Systems Academics
Ravi, Sen (email@example.com)
Cyber-Physical Systems (CPS) are increasingly coming under cyberattacks. However, cybersecurity academics and practitioners have so far focused primarily on the computer systems and networks. Given the alarming frequency of cyberattacks on CPS and the unique cyber-physical relationship in CPS, we propose that the cybersecurity needs of CPS go beyond those of purely computer and networks security. Thus, there is a need for more focused research on cybersecurity based on the cyber-physical relationship of CPS. This paper takes stock of the current state of cybersecurity of CPS and identifies research opportunities for Information Systems (IS) academics.
Sundermeier, Janina (firstname.lastname@example.org)
This report outlines the key insights gained at the “Hello Diversity! Conference” held in June 2019 at the Freie Universität Berlin (Germany). The two-day event featured 14 talks from experts in academia and practice who shared their perspectives on how entrepreneurial diversity affects the exploration and exploitation of digital innovation potentials. Their insights highlighted the lack of holistic knowledge on the topic, especially concerning the role of digital technologies in fostering entrepreneurial diversity. The shortcomings of related discourses were debated in several panel discussions with the 170 participants involved in research or in fostering entrepreneurial diversity through management practices, policies, and special interest groups. The conference culminated in a “Paperthon”, which kick-started interdisciplinary research projects aimed at increasing our understanding of entrepreneurial diversity in the digital age.
McCarthy, Stephen (email@example.com)
Information Systems (IS) research is often conducted under the assumption that technology use leads to positive outcomes for different stakeholders. However, many IS studies demonstrate limited evidence of having engaged with the stakeholders that they claim benefit and speak on behalf of. It is therefore not surprising that examples abound of where technology use has failed ‘to make the world a better place’, or worse still has contributed towards unintended negative outcomes. In light of these concerns, calls have recently emerged for responsible research and innovation (RRI) studies in IS to understand how different stakeholder groups can have a voice in complex socio-technical issues. In this paper, we take steps towards addressing this call by presenting case study findings from a responsible IS research project which combined ‘blended’ face-to-face and online participatory techniques. The case study relates to a large-scale consultation undertaken in a 24-month European project involving 30 countries. The project engaged over 1,500 stakeholders in the co-creation of future research agendas for the European Union. We discuss case study findings using Stilgoe, Owen, & Macnaghten’s (2013) RRI framework (Anticipation, Reflexivity, Inclusion, Deliberation, Responsiveness) and reflect on lessons learned for responsible IS research going forward.
The Influence of Private Alternatives on Employees' Acceptance of Organizational IS
Ostermann, Uwe (firstname.lastname@example.org)
Recent phenomena like IT consumerization, bring your own device, and shadow IT describe employees who introduce new technologies into their organizations instead of being resistant to technological change. We research the underlying mechanism that drives employees to introduce new private technology into their working environment. In our study, we intentionally separate the impact of performance of organizational IS and the impact of using private alternatives on satisfaction with organizational IS and consider the dynamics of satisfaction as a fundament of our research model. As a theoretical contribution, we suggest that familiarity with superior private alternatives for organizational IS decreases satisfaction with organizational IS, thus fostering behavioral change. In our empirical study, we find interaction effects indicating that innovative employees reach a higher level of satisfaction when the performance of organizational IS is high compared to non-innovative employees. Furthermore, we find that non-inert employees, in contrast to inert employees, become dissatisfied with organizational IS when they experience well-performing IS in their private environments.
Connections and Cognitive Speed of Older Adults: Using a Social Media Intervention to Improve Cognitive Speed
Milovich Jr., Michael (email@example.com)
As adults age, their cognitive speed declines and this decline may lead to deficiencies in cognitive functions. Both clinical and commercial applications exist for older adults that may stay or reverse this decline. This exploratory investigation focuses on determining if an intervention using a free social networking platform improves the cognitive speed of older adult participants. The investigation includes a pre-assessment, intervention, and post-assessment for older adults with an average age of 82.5 who live in an assisted living facility. Within the derived group, the findings indicate that older adults who used Instagram on an iPad produced statistically significant results in their interference responses based on the speed-of-processing tests administered. These findings show that Instagram increased the cognitive speed of processing in older adults, similar to improvements shown with clinical and commercial cognitive software. Therefore, a free social media technology may enhance older adults’ speed of processing. Additionally, it may encourage older adults to maintain an active social network and even adapt to changing technology.
Empirical Test Guidelines for Content Validity: Wash, Rinse, and Repeat until Clean
Schmitz, Kurt (firstname.lastname@example.org)
Empirical research in information systems relies heavily on the development and validation of survey instruments. A review of the information systems literature reveals that efforts to evaluate content validity for survey scales are often inconsistent, incomplete, or not reported. This paper defines and describes the most significant facets of content validity and illustrates the mechanisms through which multi-item psychometric scales capture the content of a latent construct. Competing methods are discussed and new methods proposed to assemble a comprehensive set of metrics and methods to evaluate content validity. The resulting recommendations for researchers evaluating content validity emphasize an iterative pre-study process (wash, rinse, and repeat until clean) to objectively establish “fit for purpose” during survey scale development and adaptation. A sample pre-study demonstrates methods that are suitable for creating confidence that scales reliably capture the theoretical essence of latent constructs. The efficacy of these methods is demonstrated using a randomized field experiment.
Orchestrating Digital Innovation: The Case of the Swedish Center for Digital Innovation
Holmström, Jonny (email@example.com)
There is increasing interest in how digital innovation is facilitated and enacted in networks of diverse actors, i.e. heterogenous networks. However, while there is considerable evidence that firms can build key capabilities through engagement with external partners, we find a dearth of studies on how digital innovation is orchestrated in situations where an academic unit plays a facilitating role in the heterogenous network. We address this question by focusing on experiences from a national academic initiative, the Swedish Center for Digital Innovation (SCDI). SCDI was formed in 2013 and has adopted an engaged scholarship approach and a combination of activities designed to increase digital innovation capabilities among partner organizations. We argue that the acquisition of new knowledge through external and internal sources stimulates firms and public sector organizations engaged in digital innovation to integrate such new knowledge with their existing knowledge base. Specifically, we demonstrate how SCDI’s core activities create increased capabilities for the involved stakeholders, as well as offer lessons learned and recommendations for academic units that wish to orchestrate digital innovation.
How Teachers Participate in the Infrastructuring of an Educational Network
Halkola, Eija (firstname.lastname@example.org)
The evolution of digital technologies has changed the ways in which people interact with and through technologies. Despite longstanding investment in technical and pedagogical infrastructure, there is great diversity between schools in terms of their degree of digitalization. New curricula in Finland are putting additional pressure on education to meet the goals of the 21st century. In information systems (IS) research, digitalization increases an interest for understanding modern IS projects as infrastructuring. This study examines the infrastructuring of the educational network of a Finnish city from the perspective of teachers as influential actors in transforming their environment. A nexus analysis of interviews foregrounded three main discourses circulating the teachers’ participation in infrastructuring. The first discourse depicted teachers balancing between traditional and new educational solutions when aligning their pedagogy-driven practices with curriculum objectives. The second discourse concerned infrastructuring activities for establishing pedagogical ICT use successfully, and the third discourse highlighted practices of sharing resources as an effort of organizational balancing. The results reveal tensions between collegiality and leadership, submissive and empowered agency, and discontinuities and anticipation in ensuring continuity in infrastructuring. The study provides implications for organizing in-service training and developing local practices as contributing to infrastructuring in the educational network.
Researching Digital Entrepreneurship: Current Issues and Suggestions for Future Directions
von Briel, Frederik (email@example.com)
This report documents the outcomes of a professional development workshop (PDW) held at the 40th International Conference on Information Systems in Munich, Germany. The workshop’s goal was to identify how information systems (IS) researchers can contribute to enriching the understanding of digital entrepreneurship—that is, the intersection of digital technologies and entrepreneurship. The PDW assembled numerous IS researchers working on different aspects of digital entrepreneurship. Jointly, we delineated digital entrepreneurship from related phenomena and conceptualized different roles of digital technologies for entrepreneurial endeavors. We also identified relevant strategies, opportunities, and challenges in conducting digital entrepreneurship research. This report summarizes the shared views that emerged from the interactions at the PDW and during the collaborative writing of this report. The report provides IS researchers interested in digital entrepreneurship with food for thought and a foundation for future research.
Mehta, Nikhil (firstname.lastname@example.org)
Digital learning platforms (DLPs) are rapidly emerging as highly effective tools to meet the learning and knowledge creation needs of contemporary organizations. Advanced information and communication technologies (ICT) embedded in these platforms create mobile learning workspaces that deliver ubiquitous yet targeted learning experiences. Scholars have shown a keen interest in assessing the success of DLPs, but most studies are limited by their examination of a specific facet of DLP success. Current findings also show inconsistencies and contradictions that distort our understanding of how success is shaped for DLPs. As a result, an integrated and accurate understanding of DLP success is missing. We adopt rigorous meta-analytic procedures to consolidate extant findings and to reconcile prior inconsistencies. Additionally, we extend our meta-analyses to investigate the contingency effects of two moderating variables – user-context and cultural-context. Results provide a more comprehensive and accurate understanding of DLP success. Our study contributes by extending the theory on DLPs and information systems (IS) success, and by providing insightful recommendations for practitioners.
Enabling Promethean Leaps: An Examination of Storytelling Techniques in Information Systems Development
Conboy, Kieran (email@example.com)
Storytelling has been used throughout history to instigate transformative change, and so one should expect similar of narrative techniques in information systems development (ISD) such as epics, user stories, and personas. However, existing research focuses on the operational aspects of these techniques rather than their potential for transformation or the extent to which they currently aid true transformative change in ISD. This study draws on the lens of Prometheus - the Greek god often referred to as a metaphorical symbol of the radically innovative, transformative power of technology. This study draws on expert interviews to examine the current state in practice and the potential and currently under-utilised transformative power of ISD epics, user stories and personas. This research develops a set of Promethean principles to evaluate transformative potential of narrative ISD techniques. It shows how narrative techniques might be applied and/or extended to incorporate a more Promethean level of ambition and foresight into ISD. It also identifies a set of factors that undermine the practicality of that approach.
Towards a Unified Framework for Media Capacity Characterization: Inferences from Critical Analysis of Media Capacity Theories, Buzzwords and Web History
Onobhayedo, Pius (firstname.lastname@example.org)
As the Web begins its third decade of existence, this paper in the first place, draws attention to the need for a better understanding of the Web as a potential reference case for how an information system gets transformed through incremental innovations, with particular focus on the advancement of the Web as a communication media platform. As a research step deemed necessary in this quest, the paper critically examines the suitability of existing media capacity theories and media related buzzwords (like rich media, multimedia, hypermedia, social media), for the characterization of Web innovations, as media. The origins, meanings and relationship of these buzzwords with media capacity theories were examined and clarified. Discrepancies between them were also elucidated. By way of inductive reasoning, three media capacity dimensions (sensibility support, interactivity support and logistical support) were synthesized as potential framework for objective media characterization. Each of these dimensions could metamorphize into individual theories or unified as one theory e.g. Sensibility Interactivity and Logistical Support Theory (SILST). The indicators for these dimensions were presented, followed by a demonstration of three-dimensional typology of Web innovation milestones, anchored on the three dimensions, a step forward in the substantiation of the framework’s applicability to media capacity characterization.
Exploring the Scientific Impact of Information Systems Design Science Research
Wagner, Gerit (email@example.com)
While design science research is contending its position in the information systems community, there is a lack of transparency regarding the recent and impactful information systems design science research (IS-DSR) papers. This arguably poses challenges to an informed discourse and limits our ability to communicate progress achieved by IS-DSR. After providing a map of the impactful IS-DSR papers, we therefore develop a scientometric study to address the lack of insights into factors that affect the scientific impact of IS-DSR papers published in top IS journals. In this study, we focus on IS-specific, active research areas of IS-DSR and consider papers published in the AIS Senior Scholars' Basket of Journals between 2004 and 2014. Specifically, we develop a model that explores a set of factors that affect the scientific impact of IS-DSR papers. Our findings show that scientific impact is significantly explained by theorization and novelty. We discuss the implications of our work and derive recommendations intended to shape future knowledge creation in IS-DSR.