Communications of the Association for Information Systems

Forthcoming Papers

Forthcoming papers have been accepted for publication at the Communications of the Association for Information Systems and are listed below in order of acceptance date. Copies of unedited manuscripts can be obtained by contacting the corresponding authors listed below.

Note that the decision to provide a copy rests with the authors, not with the Communications of the Association for Information Systems.

The manuscripts listed here will undergo copyediting, typesetting, and review of the resulting proofs before they are published in their final form. During the production process errors may be discovered, which could affect the content. All legal disclaimers that apply to the Communications of the Association for Information Systems pertain. For a definitive version of the works listed here, please check for their appearance online at http://aisel.aisnet.org/cais/.

HICSS Panel Report on Cognitive Foreshadowing: Next Steps in Applying Neuroscience and Cognitive Science to Information Systems Research

Randolph, Adriane B. (arandol3@kennesaw.edu)


The use of neurophysiological tools within the information systems domain has received increased attention over the last decade. The Hawaii International Conference on System Sciences has helped provide a home for rigorously exploring such work through related minitracks and symposia. This paper reports on a panel presented at the HICSS-49 conference held in 2016, during a symposium organized to help orient interested researchers to the usefulness of cognitive neuroscience in IS research. This paper first introduces the rise in the IS field for integrating the methodologies and tools of cognitive neuroscience. Then, it presents individual viewpoints from the varying panel members at the symposium as they addressed questions of longevity, applicability, and next steps for the neuroIS sub-discipline. The four panel members included: Alan Dennis, Angelika Dimoka, Allen Lee, and Ofir Turel.

Social Networks among Students, Peer TAs, and Instructors and Their Impacts on Student Learning in the Blended Environment: A Model Development and Testing

Dang, Yan (yan.dang@nau.edu)


Because of its flexibility and effectiveness, blended learning has become popular in higher education. Previous studies have discussed and presented various methods and cases that can be used and leveraged in blended courses. Other studies have described and examined the technology and/or systems that are used to support blended learning. However, no research has been seen to examine student learning from the social network perspective. Compared with traditional, face-to-face instruction, blended learning incorporates a great portion of online activities. Thus, less frequency of interactions among students, teaching assistants (if any), and instructors can be expected. Therefore, it would be of interest and importance to examine whether and how (if any) social networks among students, peer teaching assistants, and instructors could influence student learning in the blended environment. To do this, we developed and tested a research model with a large sample size of 699 students who took a blended class. The results indicated that all three types of networks (including student-student networks, student-peer TA networks, and student-instructor networks) significantly influenced both social presence and interaction, which in turned had significant impacts on learning climate and perceived academic performance.

Opening the Black Box of Advisory Services in Information Technology Outsourcing: An Advisory Activity Model

Linden, Robert (robert.linden@wiso.uni-koeln.de)


Information technology outsourcing (ITO) is an important market phenomenon and research topic. Recently, the role of advisory services has been identified as a key driver for successful ITO engagements. This research paper investigates the constituent parts and activities of third-party advisory services in ITO engagements for the first time. We used an exploratory qualitative research approach and conducted 14 expert interviews with experienced industry practitioners. Within our data analysis, we identified 104 factors, which serve as the basis for a novel IT advisory activity model for ITO. We were able to identify common viewpoints of the advisor and matched them with findings from other research studies based on a literature review. Our model provides interesting insights into an important topic of ITO, the role of advisory services in client-vendor relationships. This study delivers a basis for further research about advisor’s influence on clients and vendors in the ITO context.

Champions of IS Innovations

Renken, Jaco (jaco.renken@manchester.ac.uk)


Champions have been studied in diverse settings and kinds of initiatives; a significant body of work is also growing steadily in the information systems field. However, there is still a lack of clarity about the distinctiveness of IS champions. Given the poor track record of IS project success and champions’ importance to that success, the paper argues that this lack of conceptual clarity about the uniqueness of IS champions constitutes a significant and urgent gap. In part, this gap exists because of inadequate consolidation of knowledge about IS champions thus far. In response, we follow a systematic literature review by approaching this gap from two viewpoints: a research process perspective whereby we investigate the approaches and practices followed in IS champion research; and a thematic perspective whereby we examine progress with the accumulation of knowledge about IS champions to date. Our findings culminate in three contributions: 1) Eight IS champion distinctive features are proposed using a classification scheme; 2) A refined definition of IS champions is offered which better reflects the distinctiveness of the champion role in IS innovation; 3) Findings from process and thematic perspectives are combined in an agenda to take IS champion research forward.

Opportunities and Challenges in Healthcare Information Systems Research: Caring for Patients with Chronic Conditions

Ho, Shuk Ying (susanna.ho@anu.edu.au)


To prepare for the 2030 “baby-boomer challenge”, some governments have begun to implement healthcare reforms over the past two decades. These reforms have led to healthcare information systems (ISs) evolving into a major research field in our discipline. This research field has increasing individual, organizational, and economic impact. Because of the 2030 “baby-boomer challenge”, the number of elderly individuals is increasing, and they may have chronic illnesses, such as eye problems and Alzheimer’s disease. The practical need for healthcare ISs supporting chronic care motivated us to conduct a literature synthesis and identify opportunities for healthcare IS research. Specifically, we present the chronic care model and analyze how academic discussions on healthcare ISs have been developed in our discipline to address the needs of patients with chronic illness. Further, we identify research gaps and discuss the research topics on healthcare ISs that can be extended and customized to support these patients. Our results stimulate and guide future research in the healthcare IS field. This paper has the potential to strengthen the body of knowledge on healthcare ISs.

ICT-enabled Refugee Integration: A Research Agenda

AbuJarour, Safa'a (safaa.abujarour@uni-potsdam.de)


The recent phenomenon that has come to be known as the European refugee crisis is in reality a global problem. Accordingly, issues regarding refugee integration have become a central topic of debate worldwide. In this paper, we try to understand how refugees use information and communication technology (ICT) in different regions of the world to understand how ICT is supporting refugees’ desperate journey to safety, their stay in temporary settlement camps, and their post-settlement inclusion in host countries. With this goal in mind, we first conducted a series of interviews with Syrian refugees in Berlin, Germany to collect preliminary insights. Then, we organized panel discussions at two key information systems conferences (ICIS 2016 and ECIS 2017) involving participants from various countries. The panel discussions revealed seven key research themes: accessibility to information; availability of education and linguistic resources; admissibility to labor markets and entrepreneurship opportunities; communicability with home country; connectedness with local population; interactivity with host government; and volunteer coordination. We discuss how ICT might help to address issues related to each theme, present research questions relevant to each theme, and supply an illustration of how ICT has been employed to address an aspect of each theme. Insights gathered lead to: theoretical implications and future opportunities for research in the field of Information Systems; practical implications to be considered by different stakeholders interested in refugee integration; and social implications related to refugee crisis that cannot be ignored.

Impact of MBA Programs’ Business Analytics Breadth on Salary and Job Placement: The Role of University Ranking

Turel, Ofir (oturel@fullerton.edu)


Although many business schools have started to offer business analytics programs and courses for their MBA students, there is a lack of understanding of how these efforts translate into job market gains for their graduates, and whether the playing field is level for all business schools. To bridge this gap, we use signaling theory to investigate the impacts of the business analytics breadth (BAB) level and university ranking of MBA programs on graduates’ future employment success in terms of salary and job placement. We collected and analyzed data on business analytics relevant courses offered by the top 89 business schools in the United States, as listed on bloomberg.com. Findings revealed the vital role of university ranking in determining the efficacy of BAB to produce job market gains for students; university ranking moderated the effect of business analytics offerings on post-graduation salary and job placement. These findings provide interesting insights for researchers and business schools interested in understanding the return on investment in business analytics programs.

Social Participation among Elderly: Moderated Mediation Model of Information and Communication Technology (ICT)

Srivastava, Shashi Kant (f13shashis@iimidr.ac.in)


Social participation for elderly has been identified as a salient activity for the successful aging and hence needs to be invigorated. ICT usage results in the social participation of elderly are reported in prior studies. However, literature is silent on its mechanism. Understanding the mechanism by which ICT use lead to social participation will help us know the underlying reasons that are necessary in this process. We develop a conceptual framework considering two prominent IS theories, actor-network theory (ANT) and activity theory (AT), by incorporating four social participation-oriented factors namely; ICT use, social participation, social isolation, and loneliness. A quantitative approach based on the cross-sectional survey was used to collect data from 240 elderly. Data were analysed using structural equation modelling based on SmartPLS 3.0. We found that the size of the social network is the critical factor in the association of ICT use to social participation. The outcome of the model suggests that ICT usages do not impact the social participation directly. Rather, social isolation (absence of social network) mediates the relationship between the ICT use and social participation. Additionally, loneliness, one of the commonly observed psychological states at elderly age weakens the influence of ICT usages on social isolation. Our research advances the theoretical understanding of social participation of seniors and offers governments and businesses to prepare the ICT plan for elderly appropriately.

An Open Platform for Modeling Method Conceptualization: The OMiLAB Digital Ecosystem

Bork, Dominik (dominik.bork@univie.ac.at)


This paper motivates, describes, demonstrates in use, and evaluates the Open Models Laboratory (OMiLAB) - an open digital ecosystem designed to support conceptualization and operationalization of conceptual modeling methods. The OMiLAB ecosystem is motivated by a generalized understanding of "model value" and is targeted to research and education stakeholders fulfilling various roles in a modeling method's lifecycle - modelers, domain experts, methodologists, modeling software developers, knowledge workers, model-driven software engineers etc. While much is reported on novel modeling methods and tools for various domains, only limited knowledge is available on the conceptualization of such methods by means of a full-fledged dedicated open ecosystem and a methodology that facilitates entry points for novices, as well as an open innovation space for experienced stakeholders. This gap is maintained by the lack of an open process and platform for (a) conducting research in the field of modeling method design, (b) developing agile modeling tools and model-driven digital products, and (c) experimentation with, and dissemination of such methods & related prototypes.

Ethical Issues in Big Data Analytics: A Stakeholder Perspective

Someh, Ida Asadi (i.asadi@business.uq.edu.au)


Big data analytics is a fast-evolving phenomenon shaped by interactions among individuals, organizations and society. However, its ethical implications for these stakeholders remain empirically underexplored and not well understood. We present empirical findings from a Delphi study that identified, defined and examined the key concepts that underlie ethical issues in big data analytics. We then analyze those concepts using stakeholder theory and discourse ethics and suggest ways to balance interactions between individuals, organizations and society in order to promote ethical use of big data analytics. Our findings inform practitioners and policy-makers concerned with the ethical use of big data analytics and provide a basis for future research.

Information Technology Firms: Creating Value through Digital Disruption

Templeton, Gary F. (gtempleton@msstate.edu)


Information technology (IT) firms compose the majority of the most highly valued corporations in the world based on market capitalization. To date, the only companies in the world that have been at or near a trillion-dollar market capitalization are IT firms: Apple and Amazon. The value provided by IT speaks to how managers exploit disruptive technologies to create value in both IT and non-IT firms. A panel held at the 2018 Americas Conference on Information Systems (AMCIS) discussed various ways in which firm value is built around IT through successful management. This paper reports on the panel discussion from a variety of perspectives, which include practitioner and researcher worldviews. This panel report also provides a sample frame that researchers can use in quantitative research involving IT firms and advocates for increased research to understand the wide range of strategies IT firms use to create value.

Overview of the Multilevel Research Perspective: Implications for Theory Building and Empirical Research

Zhang, Meng (m.zhang@qut.edu.au)


A multilevel perspective in information systems (IS) research promotes understanding phenomena simultaneously at multiple levels of analysis. In understanding and employing the multilevel perspective, researchers may face challenges in relation to the value contribution, the terminology, and the critical differences between multilevel and single-level research. To address the challenges, this tutorial synthesizes contemporary thinking on the multilevel perspective. In particular, we clarify the various value contributions of the multilevel perspective, offer a consistent terminology for conducting multilevel research, and present a holistic overview of the guidelines in relation to theoretical model specification, operationalization, and theoretical model testing. This tutorial provides researchers with a holistic understanding of the multilevel perspective, allowing researchers to develop a deeper appreciation of the nuanced assumptions underlying the perspective. Thus, this paper contributes by helping researchers to more effectively and more flexibly engage in multilevel research.

Off-The-Shelf Artificial Intelligence Technologies for Sentiment and Emotion Analysis: A Tutorial on Using IBM Natural Language Processing

Carvalho, Arthur (arthur.carvalho@miamioh.edu)


A premise behind artificial intelligence (AI) is that machines can behave in a human-like way and potentially solve complex analytics problems. Recent years have seen a number of off-the-shelf AI technologies that claim to be ready to use. In this paper, we illustrate how one of such technologies, called IBM Natural Language Understanding (NLU), can be used to solve a data-analytics problem. First, we provide a detailed step-by-step tutorial on how to use NLU. Next, we introduce our case study, where we investigate the implications of a Starbucks’ pledge to hire refugees. In this context, we use NLU to assign sentiment and emotion scores to social-media posts related to Starbucks made before and after the pledge. Findings indicate that consumers’ sentiment towards Starbucks became more positive after the pledge, whereas investors’ sentiment became more negative. Interestingly, we find no significant relationship between consumers’ and investors’ sentiments. With help from NLU, we also find that consumers’ sentiments were not consensual in that there was a great deal of mixed emotions in the social-media posts. As part of our case study, we find that NLU correctly classifies the polarity of sentiments 72.64% of the time, an accuracy value much higher than the 49.77% achieved by the traditional bag-of-words approach. Besides illustrating how practitioners/researchers can use off-the-shelf AI technologies in practice, we believe the results from our case study provide value to organizations interested in implementing corporate-social-responsibility policies.

Magical Coder ‘We’: Enhancing Collaboration Transparency in Grounded Theory Method in Information Systems Research

Pekkola, Samuli (samuli.pekkola@tut.fi)


Grounded theory method (GTM) has become popular in the information systems (IS) field despite multiple interpretations and disputes about its use and usefulness. This paper analyzes how IS researchers collaborate during the GTM process and how they report on the research process. We analyze a sample of papers from the IS senior scholars’ basket of eight that use GTM as their research method to understand how collaboration in GTM is reported. We then draw from the previous literature and our own GTM research experiences to illustrate different alternatives of performing collaboration in GTM tasks, and their pros and cons in order to help other GTM researchers. We highlight potential issues arising from different epistemological and ontological stances and provide guidance and examples of how to avoid these issues and how to document the research process.

Deliberation in Mobile Messaging Application: A Case in Hong Kong

Au, Cheuk Hang (chau0481@uni.sydney.edu.au)


Considering the increasing penetration of Internet and mobile technologies, we can foresee that there are more online debates and political discussions, such as online deliberations in the future. However, prior research does not illustrate or provide empirical evidence to support a step-by-step guideline of online deliberation. To address the gaps, we have selected Project ThunderGo, an online deliberation campaign related to the 2016 Hong Kong Legislative Election, for a case study. Through analysing data obtained from their deliberation groups, the relevant news articles, and the election results, we established a 4-stage BEAR (Building/Engineering/Arriving/Reaching) model of online deliberation and provided some practical implications for future deliberation host. The model and implications are significant in articulating the role of ICT in addressing complicated and multi-facet social problems.

Exploring the Design of mHealth Systems for Health Behavior Change using Mobile Biosensors

Noorbergen, Tyler J. (tyler.noorbergen@uon.edu.au)


A person’s health behavior plays a vital role in mitigating their risk of disease and promoting positive health outcomes. In recent years, mHealth systems have emerged to offer novel approaches for encouraging and supporting users in health behavior change. A promising technology in this regard are mobile biosensors, that is, sensors that enable the collection of physiological data (e.g., heart rate, respiration, skin conductance) and that are intended to be worn, carried, or accessed during normal daily activities. Designers of mHealth systems have started to use the health information that can be gained from physiological data for the delivery of behavior change interventions. However, research providing guidance on how mHealth systems can be designed to utilize mobile biosensors for health behavior change is scant. In order to address this research gap, we conducted an exploratory study. Following a hybrid approach that combines deductive and inductive reasoning, we integrated a body of fragmented literature and conducted 30 semi-structured interviews with mHealth stakeholders. Arising from this study, a theoretical framework and six general design guidelines were developed, shedding light on the theoretical pathways for how the mHealth interface can facilitate behavior change and providing practical design considerations.

If Practice Makes Perfect, Where do we Stand?

Galletta, Dennis F. (galletta@pitt.edu)


The role of practitioners is one of the important early stepping stones in the development of the field of Information Systems. In the 1970s, IS researchers’ integration with practitioners was high, with SIM members receiving copies of the MIS Quarterly, practitioners funding the ICIS Doctoral Consortium, and submissions receiving at least one practitioner review. Today, however, the integration between practitioners and researchers appears more distant. Given that almost 50 years have passed since the field’s development, we believe it is important to reflect on the past, present, and future relationship of IS research and IS practice. Has the distance between academics and practitioners become too great? Is our relevance too low to expect practitioners to join AIS and attend our conferences? How might the integration be increased? The panelists have provided position statements regarding those issues.

Conflict and Development: A Headquarter Intervention View of IT Subsidiary Evolution

Jha, Ashish Kumar (ashish-kumar.jha@rennes-sb.com)


In this paper, we examine the impact of headquarter intervention on subsidiary evolution, specifically in the context of the Indian IT offshoring industry. We analyze the evolution of a subsidiary in the presence of a rare phenomenon – negative headquarter intervention. Such an evolution of a subsidiary has nuances and theoretical implications that cannot be fully explained by existing frameworks. Although headquarter intervention is a popular lens to study the relationship between a subsidiary and its headquarter, the lens has not been employed in extant research to examine the evolution of subsidiaries. In this paper, we present a generalized model of subsidiary evolution using the constructs of value potential, headquarter intervention, and headquarter control of the subsidiary. In line with the exploratory nature of our study, we conduct an in-depth case study of a multinational firm and its Indian subsidiary over a multi-year time period. We find that in the presence of high potential value in the subsidiary ecosystem, certain headquarter interventions can lead to a conflict between the headquarter and the subsidiary. Headquarter intervention, even with good intentions, if not aligned with interests and value of the subsidiary can negatively affect the growth of the subsidiary.

The Role of Knowledge Management in the Relationship between IT Capability and Interorganizational Performance – An Empirical Investigation

Stylianou, Antonis (astylian@uncc.edu)


Knowledge management capability (KMC) is an important link between IT and individual firm performance. We investigate this link in an interorganizational (IO) context – an increasingly important and yet substantially under-researched area. Based on a review and integration of the literature, we develop and test a comprehensive empirical conceptualization of KMC that includes knowledge creation, transfer, retention, and application. Survey data was collected from supply management professionals of one of the partner firms (either customer or supplier) in an IO relationship. The research hypotheses were tested using structural equation modeling. We find that the KMC of partner firms is positively associated with IO performance. We also find that IO information technology (IOIT) infrastructure capabilities facilitate KMC through the strength of IO relational capability. Partner interdependence is positively associated with IO relational capability and with KMC. Taking a knowledge management (KM) perspective, our research shows that relational capability and KMC are critical for IT to bring performance gains to IO partnerships. These insights have theoretical importance for understanding IT-enabled knowledge management in IO settings and practical significance for firms to effectively utilize their IOIT infrastructure.

User Satisfaction with Information Systems: A Comprehensive Model of Attribute-Level Satisfaction

Vaezi, Reza (svaezi@kennesaw.edu)


This study introduces and tests a comprehensive model of attribute-level satisfaction aimed at measuring user satisfaction with Information Systems (IS). Recognising that IS are complex ‘objects’ characterised by multiple subsystems, components, and attributes, this study draws on marketing research and attribute satisfaction theory to assess user satisfaction across three levels of abstraction. The model starts with assessing overall satisfaction as the most abstract level then moves to satisfaction with each of the major components of an Information System, that is, Information, System and Service satisfaction. This is followed by measuring user satisfaction with key attributes of each of the major IS components (e.g. information format, system reliability). The results provide a parsimonious yet practical model, along with associated measures, that is capable of assessing user satisfaction across multiple aspects of Information Systems (i.e. components and attributes) and different user interactions with the IS.

Design and Governance of mHealth Data Sharing

Vesselkov, Alexandr (alexandr.vesselkov@aalto.fi)


The proliferation of mobile health (mHealth), namely, mobile applications along with wearable and digital health devices, enables generating the growing amount of heterogeneous data. To increase the value of devices and apps through facilitating new data uses, mHealth companies often provide a web application programming interface (API) to their cloud data repositories, which enables third-party developers to access end users’ data upon receiving their consent. Managing such data sharing requires making design and governance decisions, which must allow maintaining the tradeoff between promoting generativity to facilitate complementors’ contributions and retaining control to prevent the undesirable platform use. However, despite the increasing pervasiveness of web data sharing platforms, their design and governance have not been sufficiently analyzed. By relying on boundary resource theory and analyzing the documentation of 21 web data sharing platforms, the paper identifies and elaborates 18 design and governance decisions that mHealth companies must make to manage data sharing, and discusses their role in maintaining the tradeoff between platform generativity and control.

IT Adaptation Patterns to Enterprise-wide Systems

Wanchai, Paweena (wpaweena@kku.ac.th)


The introduction of enterprise-wide systems requires users to adjust to the simultaneous requirements of the new system and the changes associated with modified business processes; this adaptation often goes beyond conspicuous behavioral elements. Therefore, to investigate the underlying attributes that characterize user interaction with and adaptation to information technology (IT), we collected data from four organizations that had implemented enterprise-wide systems for at least three years prior to the commencement of fieldwork. By taking a grounded theory approach, we identify four distinct adaptation patterns: reluctant, compliant, faithful, and enthusiastic. These patterns are configurations of five interrelated attributes that users espouse in their interaction with enterprise-wide systems: attitude towards the system, approach to learning how to use the system, level of interaction with the system, exploration of system features, and stance towards changing work practices. We propose an emergent, substantive theory of IT adaptation patterns that explains the intricate interplay of individual, task, and organizational initiatives in shaping these adaptation patterns.

Grand Challenge Pursuits: Insights from a Multi-year DSR Project Stream

Paradice, David (dparadice@auburn.edu)


We review a 30-year period of systems design efforts focused primarily on the design, implementation, and validation of a DSS to support managerial problem formulation. We do so with intimate knowledge of the projects, having either been (1) directly involved in the projects ourselves, (2) directly involved as mentors to the principal researchers, or (3) indirectly involved as colleagues of the principal researchers and in near proximity of the studies when they occurred. We identify prelude projects that lead to the definition of a broadly defined objective: the grand challenge. Foundation projects refine the capabilities and concepts needed to achieve the grand challenge. Realization projects follow in which the grand challenge is achieved. We argue that a grand challenge perspective allows us to see more clearly how individual DSR efforts contribute to a cumulative body of knowledge while simultaneously providing a context for the evaluation of individual projects. A grand challenge perspective can also guide design science research.

Conceptualizing Workarounds: Meanings and Manifestations in Information Systems Research

Ejnefjäll, Thomas (thomas.ejnefjall@im.uu.se)


We conducted a review of papers in core IS outlets that defined or used the term workaround. In the analysis, we used Ogden and Richard’s triangle of reference as a theoretical framework to analyze the relationship between (1) the term workaround, (2) theories, definitions and use of the term, and (3) their empirical basis and empirical workaround behavior described in the papers. First, we summarize the existing theoretical insights regarding workarounds and investigate the number of studies, methods used and publication outlets. Second, we show that studies have defined and used the term workaround differently to the extent that the term is not always applied to the same empirical phenomena, thus questioning the validity of some theoretical insights. Third, we suggest a definition for workarounds that is inductively derived from empirical accounts of workaround behavior and therefore adequately describes common use of the term and makes it possible to distinguish workarounds from other similar phenomena.

Giving Voice to the Voiceless: The Use of Digital Technologies by Marginalized Groups

Ortiz, Jose (j.ortiz@auckland.ac.nz)


This paper reports on a workshop hosted at the Isenberg School of Management - University of Massachusetts Amherst in September 2018. The workshop title, “Giving Voice to the Voiceless: The Use of Digital Technologies by Marginalized Groups,” was organized to discuss how marginalized groups use digital technologies to raise their voices. At the workshop, a diverse group of scholars and Ph.D. students presented research projects and perspectives on the role of digital technologies on activist projects representing marginalized groups that have gained momentum in the last few years. The studies and viewpoints presented shed light on four areas in which IS research can expand our understanding of the use of digital technologies by marginalized groups to address societal challenges: 1) The Rise of Cyberactivism; 2) Resource Mobilization for Cyberactivism; 3) Cyberactivism by and with Marginalized Groups; and 4) Research Methods for Collaborations with Marginalized Groups.

The Building Process of Patient Trust in Health Information Exchange (HIE): The Impacts of Perceived Benefits, Perceived Transparency of Privacy Policy, and Familiarity

Esmaeilzadeh, Pouyan (pesmaeil@fiu.edu)


In the context of exchange technologies, such as Health Information Exchanges (HIEs), existing technology acceptance theories should be expanded to consider not only the cognitive beliefs resulting in adoption behavior, but also the affect provoked by the sharing nature of the technology. Based on the Theory of Reasoned Action (TRA), the technology adoption literature, and the trust literature, we theoretically explain and empirically test the impacts of perceived benefits, perceived transparency of privacy policy, and familiarity on cognitive trust and emotional trust in HIE. Moreover, we analyze the effects of cognitive trust and emotional trust on the intention to opt in to the HIE and willingness to disclose health information. An online survey was conducted using data from individuals who were aware of HIE through experiences with a (or multiple) provider participating in a regional consumer-mediated HIE network. SEM analysis results provide empirical support for the proposed model. Our findings indicate that when patients know more about HIE benefits, HIE sharing procedures, and privacy guidelines, then they feel more in control, more assured, and less at risk. Result also show that patient trust in HIE may take the forms of opt-in intentions to HIE and patients’ willingness to disclose personal health information which are exchanged through the HIE. The results of this research should be of interest to both academics and practitioners.

Integrating Construal Level Theory in the Design of Fear Appeals in IS Security Research

Orazi, Davide C. (davide.orazi@monash.edu)


Fear appeals are increasingly used to motivate users to engage in behaviors that protect information security. Though academic interest in the topic has been burgeoning, prior research has mainly focused on providing process evidence on how low and high threat security messages influence protective behaviors. According to protection motivation theory, however, the threat appraisal phase, in which the receiving audience evaluates whether a fear appeal is threatening or not, follows exposure to the fear appeal. Fear appeals can indeed be designed to manipulate several different dimensions, influencing both the threat and the coping appraisal phases leading to protection motivation. The general focus on low and high threat messages runs the risks of (1) foregoing key theoretical insights that can stem from specific message manipulations and (2) inadvertently introducing message confounds. To address this issue, we introduce construal level theory as the theoretical lens to design and identify potential confounds in fear appeal manipulations. We further discuss how construal level theory can be seamlessly integrated in InfoSec studies based on protection motivation theory. Our work has important theoretical and methodological implications for IS security researchers.

When Spheres Collide: A Refocused Research Framework for Personal Use of Technology at Work

Burleson, James (jburleso@calpoly.edu)


Continued advancement in technology and more flexible work arrangements have caused employees’ personal and work spheres to collide, increasing the prevalence of the personal use of technology at work. This leads to dilemmas for employees in determining how best to manage tasks throughout the day. Prior conceptualizations of “cyberloafing,” “cyberslacking,” “personal web use,” etc. from prior research classify the behavior as unnecessarily negative and often include constraints that are non-essential to defining the construct. In this paper, a refocused research framework is offered that utilizes novel insights drawn from the multitasking literature to guide researchers in addressing a central question: How can employees most effectively manage their personal use of technology at work? A variety of topics are addressed and research questions offered to properly align research and practice while re-initiating further investigations into this interesting phenomenon.

In or Out? Perceptions of Inclusion and Exclusion among AIS Members

Windeler, Jaime (jaime.windeler@uc.edu)


People want a sense of community, a benefit of membership in a professional association like the Association for Information Systems (AIS). When attempts to create a shared experience fall short and we feel excluded, we disengage and stop further attempts to participate. In this paper, we lay a foundation for individual and association inclusion practices in the AIS. First, we describe the current state of inclusion practices within the academy and within the AIS. Then, we describe findings from a survey of AIS members that measured perceptions of inclusion and exclusion, along with factors that cultivated these perceptions. This establishes a baseline against which we can measure future change. Our data yields key insights about diversity and inclusion in the AIS, including recommendations for all individuals in various roles and positions within the AIS.

AMCIS 2017 Panel Report: Experiences in Online Education

Ferran, Carlos (cferran@govst.edu)


In this AMCIS 2017 online education panel, five experienced business school professors from public and private institutions of different sizes in three different countries (U.S.A., Mexico, and Spain) discussed how online education (i.e., eLearning, Technology-Mediated Knowledge Transfer) takes place in their institutions. They presented low-budget and high-budget examples and described what they have found to be best practices in eLearning at both the institution and the instructor level. They also demonstrated that online education can be accomplished in many different ways and with varying budgets but that as long as it is based on solid educational principles and mastery of the technology, it can be as effective –if not more– as traditional face-to-face education. This report is based on their presentations and on additional information gathered from the literature.