Forthcoming papers have been accepted for publication at the Communications of the Association for Information Systems and are listed below in order of acceptance date. Copies of unedited manuscripts can either be obtained by clicking the manuscript title or contacting the corresponding authors listed below.
Note that the decision to provide a copy rests with the authors, not with the Communications of the Association for Information Systems.
The manuscripts listed here will undergo copyediting, typesetting, and review of the resulting proofs before they are published in their final form. During the production process errors may be discovered, which could affect the content. All legal disclaimers that apply to the Communications of the Association for Information Systems pertain. For a definitive version of the works listed here, please check for their appearance online at http://aisel.aisnet.org/cais/.
A Knowledge Development Perspective on Literature Reviews: Validation of a new Typology in the IS Field
Schryen, Guido (firstname.lastname@example.org)
Literature reviews (LRs) play an important role in the development of domain knowledge in all fields. Yet, we observe a lack of insights into the activities with which LRs actually develop knowledge. To address this important gap, we (1) derive knowledge building activities from the extant literature on LRs, (2) suggest a knowledge-based typology of LRs that complements existing typologies, and (3) apply the suggested typology in an empirical study that explores how LRs with different goals and methodologies have contributed to knowledge development. The analysis of 240 LRs published in 40 renowned IS journals between 2000 and 2014 allows us to draw a detailed picture of knowledge development achieved by one of the most important genres in the IS field. An overarching contribution of our work is to unify extant conceptualizations of LRs by clarifying and illustrating how LRs apply different methodologies in a range of knowledge building activities to achieve their goals with respect to theory.
Responding to Cybersecurity Challenges: Securing Vulnerable U.S. Emergency Alert Systems
Green, Andrew (email@example.com)
U.S. emergency alert systems (EASs) are part of the nation's critical infrastructure. These systems are built on aging platforms and suffer from a fragmented interconnected network of partnerships. Some EASs have an easily identifiable vulnerability - their management website is available via the Internet. Authorities must secure these systems quickly. Other concerns exist, primarily the lack of policies for reporting vulnerabilities. To begin an assessment of U.S. EASs, we used Shodan to evaluate the availability of these websites in six southeastern states. We found 18 such websites that were accessible via the Internet, only requiring user credentials to login to the system. Next, we searched for published policies on the reporting of vulnerabilities; we found no vulnerability disclosure policies for any of the systems identified. To identify, prioritize, and address EAS vulnerabilities, we present a list of technical and management strategies to reduce cybersecurity threats. We recommend integrated policies and procedures at all levels of the public-private-government partnerships, along with system resilience, as lines of defense against cybersecurity threats. By implementing these strategies, U.S. EASs will be positioned to update critical infrastructure, notify groups of emergencies, and ensure the distribution of valid and reliable information to the populations at risk.
Evaluating Online Complex Technology-Enabled Course Delivery: A Contextualized View of a Decomposed IS Success Model
Zhao, Yu (Audrey) (firstname.lastname@example.org)
This article focuses on understanding the factors that are likely to impact the success of online delivery of courses involving complex technologies. For this study, SAP software was selected as the complex technology that students learn online and, a course management software, such as Blackboard, provided the online platform through which an SAP-enabled course was delivered to students. System quality, information quality, and service quality were the antecedent variables that were hypothesized to influence students’ perceived learning outcomes, satisfaction, and intention to continue the use of online learning. Grounded on the information systems (IS) success model, core constructs were decomposed into contextual factors. We conducted a survey of business students from four mid-sized state universities in the United States. The universities were members of the SAP university alliances, and the students had taken at least one online SAP-enabled course. We used structural equation modeling with partial least squares (PLS-SEM) for the data analysis. The findings indicate that system quality, information quality, and service (instructor) quality are all significant antecedents of student satisfaction; system quality and information quality are significant antecedents of perceived learning outcomes; and only system quality is a significant antecedent of students’ continued intention to use online learning.
The Role of Decision Rationality on Users’ Attitudes towards Utilitarian Mobile Service Usage
Xitong, Guo (email@example.com)
The use of mobile information and communication technologies (mICTs) for utilitarian service delivery has been emphasized in different industries. Firms need to understand how users make routine and unexpected use decisions in order for their utilitarian mobile services (UMSs) to gain market acceptance. This study empirically tests a theoretical model examining how both the affective attitude and the cognitive attitude influence both routine and unexpected use of UMSs as well as the role of decision rationality in the process. We tested our model using two independent empirical studies. The results show that the affective attitude has a stronger effect than the cognitive attitude on routine use, while the cognitive attitude has a stronger effect than the affective attitude on the unexpected use of UMSs. Furthermore, decision rationality weakens the effects of the affective attitude on both routine use and unexpected use but strengthens the effects of the cognitive attitude on the routine use of UMSs. Our results advance knowledge on: 1) users’ behaviors when they are engaged in UMSs; 2) the effects of attitude components at different levels of decision rationality, and 3) the underlying mechanism of the mixed findings regarding the effects of both the affective and cognitive attitudes. These findings also provide insights for practitioners on how to promote their services among consumers.
Digital Transformation of the Italian Public Administration: A Case Study
Datta, Pratim (firstname.lastname@example.org)
This case study looks at the digital transformation of the Italian Public Administration. With 60 million people, 8,000 municipalities and 23,000 local administrations, this case of digital transformation highlights how a digital renaissance is a preface for innovative disruption challenges. The Digital Transformation case uses Italy as the backdrop and Team Digitale, a team of talented individuals embarked on building public administration efficiencies and rebooting Italy’s digital innovation footprint, as the protagonist. Digital transformation is rarely, if ever, a technical solution. Instead, digital transformation is a socio-technical and socio-political solution, especially in large and complex democracies or companies with diverse, contending stakeholders. In the process, the case surfaces best practices and challenges faced when trying to tackle a mega-project across an entire economy. The case offers digital transformation recommendations, generalizable across any global democracy. This case surfaces best practices and challenges faced when trying to tackle a mega-project across an entire economy. The case study sheds light on how, contrary to private organizations, institutionalizing a disruptive innovation in a diverse democracy requires thinking within and beyond the box. This case study tackles a more difficult transformation of public administration is a large and fragmented democracy (akin to a large and decentralized multinational company). Both executives and policy makers will find considerable value from this case.
Microfoundations of Organizational Agility: A Socio-Technical Perspective
Crick, Charles (email@example.com)
To be agile, an organization needs to be able to quickly reconfigure its internal resources in order to respond to a change occurring in its environment. In this paper, we draw on the theories of organizational routines and technology affordances, to explicate the internal socio-technical “machinery” – the people, the processes and the technology - that in response to an external change, must be reconfigured and redirected to achieve the new organizational imperatives. The paper contributes a novel multi-level theory that recognizes behavior at the human individual (micro-) level as a causal factor in the macro-level phenomenon of agility. The theoretical model is illustrated and validated by case studies representing three large organizations that exist in dynamic business environments that demand agility. The research suggests that business processes within the organization evolve both by top-down design and by the bottom-up routinization of practice and further the tension between these is driven by the need for flexibility. By elucidating microfoundational mechanisms, the theory defines a stronger causality model for the explanation of organizational agility phenomena.
Demarginalizing Interdisciplinarity in IS Research: Interdisciplinary Research in Marginalization
Chughtai, Hameed (firstname.lastname@example.org)
This article reports on the 2nd Workshop of a World University Network (WUN) Research Development Funded project on “The trans-nationalization of Indigenous movements: The role of digital technologies” at the University of Southampton, UK. The workshop explored interdisciplinarity and how interdisciplinary collaboration can help us to study complex social phenomenon, such as the ways in which marginalized Indigenous communities use and shape digital technologies (such as social media) to enhance their cause. The workshop brought together scholars from diverse disciplines to engage in a critical debate. In addition to scholars from information systems, scholars from history, political science, geography, literature, arts, and anthropology came together to discuss the use of digital media by marginalized Indigenous communities. The workshop highlighted the need for more interdisciplinary research in the field and called for more critical approaches to bring such marginalized topics to the forefront of research in information systems. Three broad areas of inquiry are considered in this article: demarginalizing methodology for interdisciplinary research, interdisciplinary perspectives for demarginalization, and interdisciplinary contexts for demarginalization.
Cyberespionage Goes Mobile: FastTrans Company Attacked
Sipior, Janice C. (email@example.com)
The use of mobile devices, including smartphones and tablets, in the workplace continues to increase. The capabilities of these devices, when illegally exploited, make them a target of choice for espionage activities. Thus, an understanding of mobile espionage and how to protect against it is imperative for current and future employees. This paper is a teaching case, based on two fictitious self-driving car competitors, intended for use worldwide in information systems or business courses at the undergraduate or graduate level. In the case, students are introduced to FastTransportation Company, Ltd. (“FastTrans”), a fictitious American multinational car manufacturing company, who suspects its rival Wheelz Corporation, a leading ride-hailing company, of stealing and using trade secrets from its self-driving car division. As the stakes are high in the development of self-driving cars, Wheelz is suspected of engaging in corporate mobile espionage to steal FastTrans’ core technology underlying their patented self-driving navigation system.
Impacts of IT User Behavior: Observations Through A New Lens
Beaudry, Anne (firstname.lastname@example.org)
Theory-Based Taxonomy of Feedback Application Design for Electricity Conservation: A User-Centric Approach
Albizri, Abdullah (email@example.com)
Electricity consumption feedback applications are considered one of the critical technologies in alleviating the increasing trends of energy consumption and greenhouse gas emissions. Following the design science paradigm, this paper examines the design taxonomy of electricity consumption feedback applications. We relied on an integrative theoretical framework and literature review to propose a comprehensive taxonomy for salient design elements of electricity consumption feedback applications. Using a survey method, we collected data from general public to evaluate preferences for and relative importance of the design elements. We found that there is a preferred set of design elements for the feedback applications. Our results could serve as a basis to evaluate the design of existing electricity consumption feedback applications and to help in studying the influence of design elements on beliefs and behaviors related to individuals’ electricity conservation.
Meske, Christian (firstname.lastname@example.org)
Research on Digital Nudging has become increasingly popular in the Information Systems (IS) community. This paper presents an overview of the current progress, a critical reflection and an outlook to further research regarding Digital Nudging in IS. For this purpose, we conducted a comprehensive literature review as well as an interview with Markus Weinmann from Rotterdam School of Management at Erasmus University, one of the first scholars who introduced Digital Nudging to the IS community, and Alexey Voinov, director of the Centre on Persuasive Systems for Wise Adaptive Living at University of Technology Sydney. The findings uncover a gap between what we know about what constitutes Digital Nudging and how consequent requirements can actually be put into practice. In this context, the original concept of Nudging bears inherent challenges, e.g. regarding the focus on the individuals’ welfare, which hence also apply to Digital Nudging. Moreover, we need a better understanding of how Nudging in digital choice environments differs from that in the offline world. To further distinguish itself from other disciplines that already tested various nudges in many different domains, Digital Nudging Research in IS may benefit from a strong Design Science perspective, going beyond the test of effectiveness and providing specific design principles for the different types of digital nudges.
Examining Exploitability Risk of Vulnerabilities: A Hazard Model
Roumani, Yaman (email@example.com)
With the increasing number and severity of security incidents and exploits, information technology (IT) vendors, security managers, and consumers are placing more emphasis on security. Yet, fixing the sheer volume of vulnerabilities remains a challenge as IT vendors race against attackers to evaluate system vulnerabilities, prioritize them, and issue security patches before being exploited. In this study, we posit that IT vendors can prioritize which vulnerabilities should be patched first by assessing their exploitability risk. Specifically, we identify the most likely vulnerabilities to be exploited using vulnerability-related attributes and vulnerability types. We employ survival analysis and test our models using historical data of vulnerabilities and exploits compiled between 2007 and 2016. Our results indicate that IT vendors benefit the most from fixing vulnerabilities that are remotely exploitable, have low complexity level, require no authentication, and affect confidentiality, integrity, and availability components. Furthermore, our findings suggest that IT vendors can mitigate the risk of exploit-related attacks by remedying code injection vulnerabilities followed by buffer overflow and numeric error vulnerabilities.
Design for Empowerment: Empowering Sri Lankan Farmers through Mobile-based Information System
Ginige, Tamara (firstname.lastname@example.org)
We have developed a Mobile-based Information System (MBIS) to empower users to improve their livelihood activities. First, we had to develop an empowerment framework, due to lack of one, that underpinned the development of the MBIS. This research originated to solve an agriculture over-production problem in Sri Lanka where farmers are trapped in a poverty cycle. They are unable to make informed decisions due to lack of access to timely, context-based actionable information to achieve a good revenue. Some essential information such as current level of production had to be generated in real-time by capturing farmers’ decisions such as what and how much to grow. This required active farmer engagement where farmers needed to be empowered through the MBIS to make informed decisions. The evaluation of the impact of the MBIS showed a statistically significant positive change in empowerment levels of farmers through measurement of self-efficacy, sense of control and motivation before and after use of the application. This mobile-based system has since been adopted in India and Sri Lanka by commercial organizations, in Africa to mitigate hidden hunger and in Australia to develop Digital Health applications to manage chronic diseases, indicating the wide adoptability of the approach.
Eseryel, U. Yeliz (email@example.com)
Community-based FLOSS teams with internal governance are an extreme example of distributed teams, prominent in software development. At the core of distributed team success is team decision-making and execution. However, in the case of FLOSS teams, the lack of formal organizational structures to guide practices and the reliance on asynchronous communication might be expected to make decision making problematic. Despite these challenges many FLOSS teams are effective. There is a paucity of research in how organizations make IS development decisions in general, and the research in FLOSS decision- making models is particularly limited. Decision-making literature in FLOSS teams has focused on the distribution of decision-making power. Therefore, it is not clear which decision-making theories fit the FLOSS context best, or whether novel decision-making models are required. We adopted a process-based perspective to analyze decision-making in five community-based FLOSS teams. We identified five different decision-making processes, indicating FLOSS teams use multiple processes when making decisions. Decision-making behaviors were stable across projects despite different type of knowledge required. We help fill the literature gap about which FLOSS decision mechanisms can be explained using classical decision-making theories. Practically, community and company leaders can use knowledge of these decision processes to develop infrastructure that fits FLOSS decision-making processes.
The Internet of Things: Multi-Faceted Research Perspectives
Shim, J.P. (firstname.lastname@example.org)
Living beyond the hype, the Internet of Things (IoT) continues to grow and has clearly emerged as a leading-edge topic in information systems. As the IoT moves beyond novel technologies and exploratory sandbox initiatives to ubiquitous technologies and full production, understanding the phenomenon surrounding IoT challenges and issues has become even more important. In this paper, we explore the critical issues and challenges currently facing IoT adoption and implementation with the goal of identifying areas in need of further study. Specifically, the paper discusses IoT from several key perspectives including IoT connectivity, platforms and 5G, IoT analytics, IoT privacy, security, and litigation risks, IoT business value and monetization, and human interaction with IoT and design considerations Finally, through identifying the current state of IoT and IoT research, the paper identifies potential areas of contribution and future directions for IoT research.
A Guide for Purposive Sampling on Twitter
Sibona, Christopher (email@example.com)
The primary goal of this article is to demonstrate how to use Twitter for conducting behavioral research and to guide researchers who might benefit from using this social media platform to effectively recruit survey participants. We begin by discussing the advantages of using Twitter for survey recruitment, including respondent anonymity, purposive sampling to find respondents who are engaged in a topic of interest, ability to reach respondents quickly to investigate ephemeral events, and advantages in replicating subject populations in recruitment. We offer a guide that illustrates the mechanics of using Twitter for subject recruitment and present a successful case study offering a real-world example of how this technique was used to recruit survey participants. We provide solutions for common issues researchers might encounter when using Twitter for subject recruitment, including nonresponse due to failure to deliver timely responses to tweets, initial unwillingness to participate, and appropriate screening of potential respondents based on their tweets.
The Next Wave of CRM Innovation: Implications for Research, Teaching and Practice – Panel Report of PACIS 2016
Lokuge, Sachithra (firstname.lastname@example.org)
Globalization and the ever-changing needs of the customers have created a hyper-competitive market. As a result, customer relationship management (CRM) has become a core topic of interest among both practitioners and academics. Further, over the years, with the advancements in the technology landscape, such as the advent of digital technologies, CRM has improved in myriad ways. This article summarizes a panel discussion on CRM innovations held at the Pacific Asia Conference on Information Systems (PACIS 2016) in Chiyai, Taiwan, in 2016. The panel provided an understanding about fundamentals of CRM and how the traditional CRM systems work in organizations. Then, the panel focused on the advancement in technology landscape such as big data, analytics, internet-of-things and artificial intelligence and how such technologies have transformed innovations in the CRM landscape. Then lastly, the panel highlighted the limitations in the current CRM curricula in the universities and how such advancements need to be reflected in the modern curriculum to enhance the union between the CRM curricula and the industry needs. Further, this article provides future research ideas for academia and contributes to research interests on CRM in general.
When Programs Collide: A Panel Report on the Competing Interests of Analytics and Security
Young, Jacob A. (email@example.com)
The increasing demand for business analytics and cybersecurity professionals provides an exciting job outlook for graduates of information systems programs. However, the rapid proliferation of devices and systems that spurred this trend has created a challenging ethical dilemma for those responsible for educating future generations of information technology professionals. Many firms are collecting and storing as much data as possible in the hopes that technology might uncover useful insights in the future. This behavior results in an ever-increasing challenge for those charged with protecting organizational assets and exerts pressure on executives seeking an analytical edge to remain profitable in a hyper-competitive marketplace. With this dilemma in mind, a recent panel discussion at the 14th Annual Midwest Association for Information Systems Conference explored the delicate balance between unleashing the power of analytics and securing the sensitive data it consumes, while respecting consumer privacy. This paper reports on that discussion and its insights.
The Interaction of Virtual Reality, Blockchain, and 5G New Radio: Disrupting Business and Society
French, Aaron M. (firstname.lastname@example.org)
The three cutting-edge technologies Virtual Reality, blockchain and 5G are continuously growing in public attention. Virtual reality was popularized in the 1990's but recent advances in technology and decrease costs have create a resurgence in the technology. With significant funding and early adoption, blockchain and 5G are both ready to make their mark on the world. Each of these technologies alone are primed to disrupt business and society but together they provide a multitude of opportunities waiting to be explored. A panel of IS researchers and industry practitioners tackled important topics related to the culmination of these technologies. This article summarizes the 2018 Association for Information Systems Americas Conference on Information Systems (AMCIS) panel session that makes the case for IS research that focuses on the intersection of these technologies. Each panelist presented their perspectives based on experience and knowledge along with current issues and future directions. This topic has significant business implications as practitioners continue to take notice of their advancements and develop strategies to adapt in a rapidly changing environment. The paper also present researcher perspectives and implications that will inform and describe opportunities for future research as these technologies continue to become more prevalent.
Yim, Dobin (email@example.com)
The design of information artifacts incorporates cognitive elements to inform and entice users of relevant content. Sparse research has examined the cognitive design of information artifacts in the digital news platforms context. This study investigates how semantic and sentiment elements of information artifacts convey meaning and emotion to elicit the sharing of online news. We propose a dissonant framework and hypothesize that three dissonance dimensions, namely, semantic, textual sentiment, and visual sentiment dissonance, influence news sharing, anchoring to the central and peripheral routes of the elaboration likelihood model of persuasion. The hypotheses are tested using real-world data from 2013 to 2015 from Mashable- a popular digital news platform. Novel machine learning techniques are used to extract topics and sentiments from text and photos in the news articles. Findings from the econometric analysis support that textual sentiment and visual sentiment dissonance positively affect news sharing.