Communications of the Association for Information Systems

Forthcoming Papers

Forthcoming papers have been accepted for publication at the Communications of the Association for Information Systems and are listed below in order of acceptance date. Copies of unedited manuscripts can be obtained by contacting the corresponding authors listed below.

Note that the decision to provide a copy rests with the authors, not with the Communications of the Association for Information Systems.

The manuscripts listed here will undergo copyediting, typesetting, and review of the resulting proofs before they are published in their final form. During the production process errors may be discovered, which could affect the content. All legal disclaimers that apply to the Communications of the Association for Information Systems pertain. For a definitive version of the works listed here, please check for their appearance online at http://aisel.aisnet.org/cais/.

Learning from the History of Business Intelligence and Analytics Research at HICSS – A Semantic Text Mining Approach

Marjanovic, Olivera (olivera.marjanovic@uts.edu.au)


This research project was inspired by the 50th anniversary of the Hawaii International Conferences on Systems Sciences (HICSS). Although multidisciplinary by nature, HICSS has established itself as the leading international conference in Business Intelligence (BI), Business Analytics (BA) and more recently, big data research. Given a large number of academic and industry conferences in these areas, it is worth reflecting on, and learning from the long tradition of BI and BA research at HICSS. In this paper we analyzed the 28-year history of HICSS’ longest-running minitrack on BI and BA in order to identify its main research themes and reflect on their evolution over time. Our insights provide research grounding for the current thinking about big data, which contrary to many statements, are not new phenomena. We also illustrate a practical method of combining a semantic text mining tool (Leximancer) and collaborative sense-making. Reflecting on the method, we argue that meaningful insights are not generated by technology, regardless of how sophisticated it might be. Instead, in our research these insights were co-constructed by domain experts through an iterative process of collaborative sense-making in a given context. This particular point should be considered by other researchers interested in semantic text mining.

Knowledge, Innovation, and Entrepreneurial Systems at HICSS

Jennex, Murray E. (mjennex@mail.sdsu.edu)


This paper presents an overview and history of the Knowledge, Innovation, and Entrepreneurial Systems (KIES) track as well as the knowledge and related systems research community at the Hawaii International Conference on System Sciences (HICSS). This community began as a task force examining organizational memory in HICSS-27. It has since evolved into a mini-track, then a research cluster and finally a full research track encompassing research Knowledge, Innovation, and Entrepreneurial Systems. The purpose of this paper is to acquaint knowledge system researchers with a research community that has leveraged the Hawaii International Conference on System Sciences (HICSS) to develop a rich history of high quality scholastic inquiry in the areas of knowledge system, knowledge management, innovation systems, entrepreneurial systems, organizational memory, and organizational learning research.

The Trajectory of IT in Healthcare at HICSS: A Literature Review, Analysis, and Future Directions

Samhan, Bahae (bmsamha@ilstu.edu)


Evidence of the rapid implementation and adoption of information technology in the healthcare industry has been demonstrated extensively. Research in HIT have been a major component of the HICSS proceedings and demonstrate similar findings. Included in these findings are the many studies in HIT that were part of HICSS proceedings from 2008-2017. We reviewed the literature to better understand the work that has been done over the last ten years in HIT. This review revealed themes, methods, technology types, research populations, context, and emerged research gaps from the reviewed literature. With much change and development in the field of HIT and varying levels of adoption, this review was necessary to uncover, catalog, and analyze the research in HIT at HICSS in this ten-year period of time as well as provide future directions for research in the field.

Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation

Crossler, Robert E. (rob.crossler@wsu.edu)


The use of and contributions to theory are critical to the development and advancement of the information systems (IS) discipline. While few IS scholars create new theories, many borrow and adapt theories from other fields to study a variety of phenomena within the realm of IS. Over time, this has raised concerns among scholars as to the appropriateness and quality of theories adapted within the discipline. This is particularly troublesome when one considers conflicting results from many studies claiming to leverage the same theoretical foundation. We examine the issues surrounding theory adaptation in IS and provide a set of integrated theory adaptation guidelines to help scholars achieve successful and reliable adaptation of theory. We then provide an illustrated example of our adaptation guidelines using Protection Motivation Theory in an organizational information security setting.

A Ransomware Case for Use in the Classroom

Sipior, Janice C. (janice.sipior@villanova.edu)


Given the global growth in ransomware attacks, an understanding of the risks of ransomware and how to protect against it is imperative for future employees. This paper is a teaching case, based on an actual ransomware attack on a hospital, intended for use in an undergraduate or graduate course. Students are introduced to Wildcat Hospital, a fictitious 450-bed acute-care facility in a suburban location in the Northeastern United States. A ransomware attack hit Wildcat Hospital as the workday got underway. The Hospital's computers were infected with malware and a ransom of one bitcoin, a virtual currency that affords anonymity, was demanded to restore functionality of the information systems. The organizational response to the ransomware attack was led by the Chief Executive Officer and the Chief Information Officer. Links to two videos, a demo of a Locky ransomware attack in action and a National Broadcasting Company (NBC) TV network news report about a similar ransomware incident at another hospital, Hollywood Presbyterian Medical Center in California, U.S., are included to engage students.

Data Science Roles and the Types of Data Science Programs

Saltz, Jeffrey (jsaltz@syr.edu)


Data science, and the related field of analytics, is a growing discipline that integrates concepts across a range of domains, including computer science, information systems and statistics. While the number of data science programs continues to increase, there has been little discussion on how we should define this emerging educational field. With this in mind, during the Twenty-Third Americas Conference on Information Systems (AMCIS’17), a panel discussion explored emerging questions regarding data science and analytics education. This paper reports on that panel discussion, which focused on questions such as what is a data science degree and what are the learning objectives within a data science program. The panel also debated if there should be different types of data science related programs (such as an applied data science program or a business analytics program) and if so, should there be a common core across the different variations of programs. The target audience for this report are information system educators who can gain a better understanding of current trends in data science / analytics education, as well other information system researchers who are interested in how data science/analytics might impact the broader field of information systems and management education.

Providing The Effects of the Quantification of Faculty Productivity: Perspectives from the Design Science Research Community

Tremblay, Monica C. (monica.tremblay@mason.wm.edu)


In recent years, efforts to assess faculty research productivity have become more focused on the measurable quantification of academic outcomes. For benchmarking academic performance, different ranking and rating lists have been developed that define what is regarded as high-quality research. While many scholars in IS consider lists such as the Senior Scholar’s Basket (SSB) to be good guidance, others who belong to less-mainstream groups of the discipline could perceive these lists as constraining. We analyze the perceived impact of the SSB on Information Systems (IS) academics working in Design Science Research (DSR), and in particular how it affected their research behavior. We found the DSR community felt a strong normative influence from the SSB. A content analysis of the SSB shows evidence that some of the journals in the SSB have become more accepting of DSR. We noted the emergence of papers in the SSB that outline the role of theory in DSR and describe DSR methodologies, indicating that the DSR community is rallying to describe what to expect from a DSR manuscript to the broader IS community, and to guide the DSR community on how to organize papers for publication in the SSB.

Promoting Domain-Specific Participation via Off-topic Forum Participation in Electronic Networks of Practice

Mattson, Thomas (tmattson@richmond.edu)


In this paper, we investigate how members’ participation in off-topic social forums in electronic networks of practice (eNoPs) influences their propensity to participate in the domain-specific forums. Currently, the literature offers two theoretical arguments that would predict opposing outcomes concerning the impact of off-topic participation on participating in the domain-specific forums. In this paper, we argue that investigating the network structure of the off-topic forum has the theoretical flexibility to reconcile these opposing theoretical arguments. We specifically hypothesize that the overall network structure of the off-topic forum (network cohesion as determined by the global clustering coefficient) moderates the impact of off-topic forum participation on participating in the domain-specific forums. We theorize that, given equal conditions, off-topic participation creates social bonds that positively affect domain-specific participation when the network structure of the off-topic forums is highly cohesive. Contrarily, however, we posit that off-topic forum participation becomes a noisy distraction when the network structure of the off-topic forum becomes less cohesive. We provide empirical support for these hypotheses via a ten-year longitudinal study of software developers’ participation in an eNoP. Our paper highlights new theoretical insights on the network effects in eNoPs, whereby network structures in one section of an eNoP (off-topic forums) have ramifications for behaviors in different sections of the eNoP (domain-specific forums).

How to Generate More Value from IT: The Interplay of IT Investment, Decision-Making Structure, and Senior Management Involvement in IT Governance

Turedi, Serdar (sturedi@pnw.edu)


Information Technology (IT) represents a large portion of investment in an organization. Prior research has identified the linkage between IT investment and productivity. Numerous factors affect the value an organization can derive from its IT investment. However, extant literature understudies the impact of IT governance on business value of IT. In this study, we aim to fill this gap by investigating the effects of IT decision-making structure mechanisms and senior management’s IT governance involvement on the relationship between IT investment and organizational performance. This study builds on a novel framework that integrates two theories on IT in an organizational setting: strategic choice theory and contingency theory. Organization-level IT investment and IT governance practice data are pooled with other organization characteristics to investigate the moderating effects of IT governance practices. The empirical analyses reveal a positive moderating effect of IT decision-marking structure mechanisms on the IT investment–organization performance relationship. Nevertheless, the results indicate that senior management’s IT involvement has no significant effect on this relationship. This study shows the importance of IT governance for organizations to effectively leverage their IT investment.

Does Conventional Wisdom Apply? An Enterprise System Sourcing Decision for a Retail Business in Fiji

Casterella, Gretchen I. (gretchen.irwin@colostate.edu)


This case explores a critical enterprise system replacement decision faced by the directors of a family-owned and operated retail organization in Fiji, a developing country. The case asks students to assess the risks and potential rewards of enterprise sourcing alternatives for the Fijian retailer. The goal is to sensitize students to the organizational, environmental, and technological issues facing this business, such as unreliable and expensive electricity and broadband internet. Some of these issues are taken for granted by students who reside in developed countries, and thus, the case challenges them to consider a broader global context and question the conventional wisdom of solutions like cloud computing and ERP packaged software benefits for small- and medium-sized businesses.

A Historical Perspective on Information Systems: A Tool and Methodology for Studying the Evolution of Social Representations on Wikipedia

Gal, Uri (uri.gal@sydney.edu.au)


In recent years there has been a growing interest in developing historically-informed explanations of information systems. Several authors have suggested that doing so can help information systems scholars to examine shifts in the academic nature of our field, trace the origins of prominent information systems phenomena, and reflect on and critique their own work. To enable such inquiry, we draw on the theory of social representation to build an analytical tool, WikiGen, and develop a methodology for examining the evolution of collective knowledge on Wikipedia. We demonstrate the usefulness of the tool and methodology by applying it to an illustrative case study, the Wikipedia article Cloud Computing. After presenting the results of the analysis, we discuss the applicability of the tool and methodology, the contributions of our study, and possibilities for future research.

Social Influence and Willingness-to-Pay for Massively Multiplayer Online Games: An Empirical Examination of the Social Identity Theory

Setterstrom, Andrew J. (asetterstrom@niu.com)


The development and sale of massively multiplayer online games has emerged as a significant part of the 21st century entertainment industry. Yet, firms competing in this sector of the video game industry vary in their ability to generate revenue from their products. We contend that one of the primary factors determining which massively multiplayer online game individuals consume is social influence. Using the social identity theory for our theoretical underpinning, we argue that individuals are influenced by the identity provided through membership in important social groups. This research investigates the effects that two identity-related constructs, consumer-brand identification and social identity complexity, have on satisfaction and willingness-to-pay a subscription fee for a massively multiplayer online game. Our results suggest that social influence has a complex relationship with an individual’s willingness-to-pay. Consumer-brand identification and social identity complexity had significant direct relationships with willingness-to-pay, while consumer-brand identification had a significant indirect relationship with willingness-to-pay through satisfaction. Additionally, social identity complexity significantly moderated the relationship between consumer-brand identification and willingness-to-pay. Overall, our results provide support in favor of the social identity theory as an explanation of how social influence occurs for individuals that play massively multiplayer online games.

Does the Ability to Choose Matter? On the Relationship between Bring-Your-Own Behavior and IT Satisfaction

Kampling, Henrik (henrik.kampling@uni-siegen.de)


Organizational tasks are increasingly fulfilled using privately owned consumer technologies including private devices (e.g. smartphones) or private internet accounts (e.g. email accounts). A major reason for this type of bring your own behavior (BYOB) is a higher level of satisfaction. However, little research exists that theoretically explores and empirically tests this assumption. This study sheds light on this phenomenon by analyzing the effect of BYOB on IT satisfaction. Drawing from social cognitive theory, we propose choice self-efficacy as a new construct that intermediates between BYOB and IT satisfaction. Building upon results from survey data (n = 400), we provide new evidence that BYOB has a positive effect on IT satisfaction, whereby choice self-efficacy plays a vital element as it mediates this relationship. Since IT satisfaction is an important processor of technology use and performance, we derive important implications for future research on IT consumerization. Furthermore, we provide several conclusions for practitioners and discuss how to enhance IT satisfaction and choice self-efficacy.

The “Theoretical Lens” Concept: We all Know What it Means, but do we all Know the Same Thing?

Niederman, Fred (niederfa@slu.edu)


The term “theoretical lens” has been growing in usage in the context of business and social science research, particularly in the information systems discipline. In this paper we question what the term really means by examining it on several dimensions within the context of its actual use. In particular we consider (1) where it is used in each article; (2) what do the “lenses” consist of (3) the IS domain of the article where it is applied; (4) the research method used in the article where it is applied; (5) and which underlying conceptualizations are actually used. We do this by examining the full set of actual uses in the IS journal where the term is found most frequently, European Journal of Information Systems. We conclude by discussing a number of further questions raised by these observations, suggesting deeper issues about better and less advantageous uses of theoretical lenses in IS research and what this might imply for the field.

Social Networks among Students, Peer TAs, and Instructors and Their Impacts on Student Learning in the Blended Environment: A Model Development and Testing

Dang, Yan (yan.dang@nau.edu)


Because of its flexibility and effectiveness, blended learning has become popular in higher education. Previous studies have discussed and presented various methods and cases that can be used and leveraged in blended courses. Other studies have described and examined the technology and/or systems that are used to support blended learning. However, no research has been seen to examine student learning from the social network perspective. Compared with traditional, face-to-face instruction, blended learning incorporates a great portion of online activities. Thus, less frequency of interactions among students, teaching assistants (if any), and instructors can be expected. Therefore, it would be of interest and importance to examine whether and how (if any) social networks among students, peer teaching assistants, and instructors could influence student learning in the blended environment. To do this, we developed and tested a research model with a large sample size of 699 students who took a blended class. The results indicated that all three types of networks (including student-student networks, student-peer TA networks, and student-instructor networks) significantly influenced both social presence and interaction, which in turned had significant impacts on learning climate and perceived academic performance.

Institutionalizing Information Systems for Universal Health Coverage in Primary Health Care and the Need for New Forms of Institutional Work

Nielsen, Petter (pnielsen@ifi.uio.no)


Achieving that all people can use health services of sufficient quality without being exposed to financial hardship, i.e. Universal Health Coverage, is an urgent priority of global health, and to measure progress towards this, countries need to build robust supporting Health Information Systems. Because Universal Health Coverage must be rooted in Primary Health Care, Universal Health Coverage Health Information Systems also need to be sensitively anchored within the existing routine Health Information Systems. This represents a non-trivial challenge, which we study through an empirical analysis of an Indian state's effort to implement a Universal Health Coverage Health Information System within primary care. Using a theoretical lens informed by institutional theory, we seek to answer the question of “what kind of change is required to develop institutions that support the use of new technologies and associated work processes entailed by Universal Health Coverage?” We identify the contradictions that emerge when the new system clashes with what traditionally exists, and we formulate implications in terms of design of systems, work processes and institutions to support implementation. Our paper contributes by building an understanding of inherent complexities in Universal Health Coverage Health Information System design and implementation, and by providing system design guidelines.

Leveraging Customer Integration Experience: A Review of Influencing Factors and Implications

Füller, Kathrin (kathrin.fueller@tum.de)


There has been an ever-increasing trend to co-create innovations with customers in online communities, idea competitions, or crowdsourcing initiatives. Yet, many customer integration methods fail to attract sufficient customer participation and engagement. We draw on previous research to identify customers’ experience as an important determinant of the success of the whole customer integration initiative. However, the notion of experience has rarely been applied in the context of customer integration. We conduct a cross-disciplinary literature review to identify the factors that constitute a positive customer integration experience and the implications of the customer integration experience. Based on 141 papers from marketing, technology and innovation management, information systems, human-computer interaction, and psychology research, we derive a classification of influencing factors and implications of customer integration experience. Our review provides a framework that integrates 22 conceptually different influencing factors, 15 implications, and their interrelatedness based on motivation-hygiene theory. The framework sheds light on the current state of research on customer integration experience and identifies possibilities for future research.