Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance
Dustin Ormond, Merrill Warkentin, Robert E. Crossler
Information systems security behavioral research has primarily focused on individual cognitive processes and their impact on information security policy noncompliance. However, affective processes (operationalized by affective absorption and affective flow) may also significantly contribute to misuse or information security policy noncompliance. Our research study evaluated the impact of affective absorption (i.e. the trait or disposition to have one’s emotions drive decision making) and affective flow (i.e. a state of immersion with one’s emotions) on cognitive processes in the context of attitude toward and compliance with information security policies. Our conceptual model was evaluated using a laboratory research design. We found that individuals who were frustrated by work-related tasks experienced negative affective flow and violated information security policies. Furthermore, perceptions of organizational injustice increased negative affective flow. Our findings underscore the need for understanding affective processes as well as cognitive processes which may lead to a more holistic understanding regarding information security policy compliance.
An Analysis of the Evolving Intellectual Structure of Health Information Systems Research within the Information Systems (IS) Discipline
Langtao Chen, Aaron Baird, Detmar W. Straub
The rapid evolution of health information systems (Health IS) research has led to many significant contributions. However, while the Health IS subset of information systems (IS) scholarship has considerably grown over the past two decades, this growth has led to questions regarding the current intellectual structure of this area of inquiry. In an effort to more fully understand how Health IS has contributed to the IS discipline, and what this may mean for future Health IS research in the IS domain, we conduct an in-depth evaluation of Health IS research published in mainstream IS journals. We apply citation analysis, latent semantic analysis (LSA), and social network analysis (SNA) to our dataset of Health IS articles in order to: (1) identify Health IS research themes and thematic shifts, (2) determine which Health IS research themes are cohesive (versus disparate), (3) identify which Health IS research themes are central (versus peripheral), (4) clarify networks of researchers (i.e., thought leaders) contributing to these research themes, and (5) provide insights into the connection of Health IS to its reference disciplines. Overall, we contribute a systematic description and explanation of the intellectual structure of the Health IS and highlight how the existing intellectual structure of Health IS provides opportunities for future research.
The Role of Evaluability Bias and the Fairness Effect in Escalation of Commitment to a Troubled Software Product Development Project
Jong Seok Lee, Mark Keil, Sangcheol Park
New software product development entails considerable risks. One significant risk is that decision makers can become overly committed to a troubled software product development project (i.e., escalation of commitment). While prior research has identified factors that promote escalation in information technology projects, there has been little attempt to leverage the context of software product development which can include evaluating attributes of a software product under development and weighing a personal financial reward tied to a successful product launch. In this study, we conducted two experiments to investigate how evaluability bias concerning software attributes, and the fairness effect that arises from the relative amount of a personal financial reward, influence escalation of commitment to a troubled software product development project. Our findings suggest that escalation of commitment to a troubled software product development project is influenced by both evaluability bias, which affects the perceived attractiveness of a software product under development, and the fairness effect, which influences the perceived attractiveness of a personal financial reward tied to a successful product launch. This study contributes to both the information systems (IS) literature and the escalation literature by providing novel theoretical explanations as to why escalation occurs in the context of new software product development.
Brute Force Sentence Pattern Extortion from Harmful Messages for Cyberbullying Detection
Michal Ptaszynski, Fumito Masui, Pawei Lempa, Yasutomo Kimura, Rafal Rzepka, Kenji Araki
Cyberbullying, or humiliating people through the Internet, existed almost since the beginning of Internet communication. Recent introduction of smartphones and tablet computers caused cyberbullying to evolve into a serious social problem. In Japan, to deal with the problem, members of Parent-Teacher Association (PTA) read through the Web to spot cyberbullying entries. To help PTA members in their uphill task we propose a novel method for automatic detection of malicious Internet contents. The method is based on a combinatorial approach resembling brute force search algorithms with application to language classification. The method extracts sophisticated patterns from sentences and uses them in classification. The experiments performed on actual cyberbullying data showed advantage of our method to previous methods. Next, we implemented the method into an application for Android smartphones to automatically detect possible harmful content in messages. The method performed well under the Android environment, although it needs to be optimized for time efficiency to be used in practice.
Scientific Knowledge Communication in Professional Q&A Communities: Linguistic Devices as a Tool to Increase the Popularity and Perceived Professionality of Knowledge Contributions
Yicheng Zhang, Tian Lu, Chee Wei Phang, Chenghong Zhang
With the emergence of professional question-and-answer (Q&A) communities, widespread dissemination of scientific knowledge has become more viable than ever before. However, contributors of scientific knowledge are confronted with the challenge of making their professional knowledge contributions popular, as non-expert readers may not appreciate their contributions given the massive and chaotic information on the Internet. In this study, we first show that, although nonexpert readers are similar to experts in their ability to evaluate the professionality of content contributed in such communities, a salient discrepancy exists between the content they favor and the content they perceive as professional. In line with studies that have suggested writing techniques play an important role in how expert content is received by laypersons, we investigated the effect of the use of linguistic devices on the perceived professionality and popularity of content contributions in Q&A communities. Based on both secondary data and a scenario-based survey, we uncovered specific linguistic devices that can increase content popularity without reducing perceived professionality. Additionally, we revealed linguistic devices that increase popularity at the expense of perceived professionality in this context. A laboratory experiment was conducted to more firmly establish the causal effects of the linguistic device use. The triangulated findings have important implications for both research and practice on communicating scientific knowledge in professional Q&A communities.
Harnessing Aspect-Based Sentiment Analysis: How are Tweets Associated with Forecast Accuracy?
Shuk Ying Ho, Stanley Ka Wai Choi, Fan Yang
For firms in the consumer sector of the economy, tweets about service quality reflect consumer satisfaction, which determines firms’ future earnings. Our study responds to anecdotal evidence indicating that analysts have adopted opinion mining to scrutinize Twitter data to detect shifts in consumer behavior and to make earnings forecasts. If this anecdotal evidence is accurate, certain tweet characteristics may be associated with accuracy of earnings forecasts for these firms. Our study draws on the literature on consumer satisfaction and firm earnings to identify possible tweet characteristics and hypothesize their associative relationships with analyst forecast accuracy. We focus on tweets that reveal people’s opinions about a firm’s service quality. Five hypotheses are developed to examine how tweet characteristics are associated with analyst forecast accuracy. We use the airline industry as the study context, and extract tweets in relation to airlines’ service quality from publicly available Twitter data and analyst forecast data from the Institutional Brokers’ Estimate System Academic. We apply content analysis, followed by aspect-based sentiment analysis, to the downloaded tweets. Using regressions, we find that the breadth of coverage and the number of posters are associated positively with forecast accuracy. The valence of tweets differentiates their effects on forecast accuracy: negative tweets enhance forecast accuracy to a greater extent than do positive tweets. We do not detect any association between tweet subjectivity and analyst forecast accuracy. There is a marginal negative association between tweet dispersion and forecast accuracy. Theoretical and practical contributions are discussed..
How do Individuals Interpret Multiple Conceptual Models? A Theory of Combined Ontological Completeness and Overlap
Jan Recker, Peter Green
When analyzing or designing information systems, users often work with multiple conceptual models because each model articulates a different, partial aspect of a real-world domain. However, the available research in this area has largely studied the use of single modeling artefacts only. We develop new theory about interpreting multiple conceptual models that details propositions for evaluation of individuals’ selection, understanding, and perceived usefulness of multiple conceptual models. We detail several implications of our theory development for empirical research on conceptual modeling. We also outline practical contributions for the design of conceptual models and for choosing models for systems analysis and design tasks. Finally, to stimulate research that builds on our theory, we illustrate procedures for enacting our theory and discuss a range of empirically relevant boundary conditions.
Specialized Information Systems for the Digitally Disadvantaged
Florian Pethig, Julia Kroenung
A number of specialized information systems for the digitally disadvantaged (SISD) have been developed to offset the limitations of people unable to participate in the information society. However, contributions from social identity theory and social markedness theory indicate that SISD can activate a stigmatized identity and thus be perceived unfavorably by their addressees. We identify two mechanisms by which functional limitations affect a digitally disadvantaged person’s adoption decision: (1) adoption decision as shaped through technology perceptions (i.e., perceived usefulness, perceived ease of use, and perceived access barriers) and (2) adoption decision as shaped through marked status awareness (i.e., stigma consciousness). We test our contextualized research model on digitally disadvantaged users with physical and/or sensory disabilities. Results of our mediation analysis show that individuals who have most to gain from SISD use (i.e., those with high functional limitations) are doubly disadvantaged. They find it more challenging to use SISD and are also more sensitive to the fear of being marked as disadvantaged or vulnerable.
On the Optimal Fixed-Up-To Pricing for Information Services
Shinyi Wu, Paul Pavlou
Fixed-Up-To (FUT) pricing allows consumers to purchase a fixed usage amount of an information service for a certain fixed price chosen from a menu of plans. In this study, we first derive an optimal analytical solution for FUT menu pricing without imposing the strong single-crossing assumption. Second, we illustrate the analytical solution by leveraging mixed integer nonlinear programming to derive an optimal FUT pricing scheme for information services. Third, we investigate when, and by how much, FUT pricing improves upon the commonly-used “flat rate” pricing. Our numerical results show that FUT pricing improves the service provider’s profits while enhancing social welfare when consumers face different maximum consumption level bounds. Notably, in terms of optimal pricing, our numerical results show that the consumers’ maximum consumption level bounds are more important than their utility functions. Most importantly, our results show that FUT pricing performs better than flat rate pricing under incomplete information. Finally, we empirically show that it is not necessary to treat over limit rates as a decision variable in terms of optimal FUT pricing since both FUT pricing and three-part tariffs are reasonable approximations of non-linear pricing in terms of both firm profits and social welfare. Theoretical and practical implications for the design of optimal FUT pricing toward enhancing firm profits, consumer surplus, and social welfare are discussed.
Game of Platforms: Strategic Expansion into Rival (Online) Territory
Online platforms, such as Google, Facebook, or Amazon, are constantly expanding their activities, while increasing the overlap in their service offering. This paper asks: Is expansion into rival platforms’ services profit-maximizing when users’ platform choices endogenously change with expansion? We model an expansion game between two online platforms, both incumbents in distinct service markets, providing their services for free to users, and earning ad-based revenues. Platforms decide whether or not to expand by adding the service already offered by the rival. Expansion is costly, and impacts users’ platform choice, namely, their choice of single- vs. multi-homing, which, in turn, affects platform prices and profits derived from the advertisers’ side of the market. We demonstrate that, in equilibrium, platforms may choose not to expand. Strategic "no expansion" decisions are due to the quantity and price effects of changes in the user partition due to expansion. We analyze the effects of expansion-driven changes in inter-platform compatibility, expansion costs, users’ probability of ad-engagement, switching costs, and intra-platform service complementarity and quality on the optimal expansion strategy. We derive an optimal expansion rule, incorporating these considerations, to guide managerial decision making regarding expansion into a rival’s “territory.”
Assortment Size and Performance of Online Sellers: An Inverted U-Shaped Relationship
Yumei He, Xunhua Guo, Guoqing Chen
This paper investigates the role of assortment size in sellers’ performance in the ecommerce context, which is primarily characterized by lowered search costs and switching costs. In contrast to the findings in the literature, our theoretical analysis postulates an inverted U-shaped association, showing that performance of online sellers increases and then decreases as the assortment size enlarges. The nonlinear effect can be effectively explained by the interplay between the benefits from simultaneous consumer utility and the liabilities from competition-intensifying effect. Additionally, the optimal level of assortment size is lowered when the market density or product uncertainty is high. Using a dataset of 10,000 online sellers from a large ecommerce platform, our hypotheses concerning the inverted U-shaped curve and moderation effects of market density and product uncertainty are statistically supported. Our research contributes to the assortment literature by revealing the special effects of assortment size in the online retailing context. Our findings also provide practical implications for online sellers’ assortment planning and optimization under both general settings and specific conditions.
Generally Speaking, Context Matters: Making the Case for a Change from Universal to Particular ISP Compliance Research
Salvatore Aurigenma, Thomas Mattson
The objective of our paper is to challenge conceptually and empirically the idea of general information security policy (ISP) compliance. Conceptually, we argue that general ISP compliance is an ill-defined concept that has minimal theoretical usefulness because ISP directed security actions vary considerably from threat-to-threat in terms of time, difficulty, diligence, knowledge, and effort. Yet, our senior IS scholar’s basket of journals has a strong preference to publish models where the authors speculate that their findings are generalizable across all (or many) threats and controls contained in an organization’s ISP. We present that compliance with mandatory threat specific security actions may require different (as opposed to similar) behavioral explanations, which makes constructing a universal model of ISP compliance problematic. Therefore, we argue that future ISP compliance literature will be more valuable if it focuses on the mechanisms, treatments, and behavioral antecedents associated with the required actions around specific threats instead of attempting to build a model that purportedly covers all (or many) threat specific security actions. To support this claim empirically, we conducted two studies comparing general and threat specific compliance intentions. Our data show that compliance intentions vary significantly across general compliance measures and multiple threat specific security measures or scenarios. These results indicate that it is problematic to generalize about behavioral antecedents from general compliance intentions to threat specific security compliance intentions, from one threat specific security action to other threat specific security actions, and from one threat specific security action to general compliance intentions.
Design Science Research in Doctoral Projects: an Analysis of Australian Theses
Aileen Cater-Steel, Mark Toleman, Mohammad Mehdi Rajaeian
Design Science Research (DSR) has gained popularity with doctoral students. In the Information Systems (IS) discipline, DSR is distinctive in creating knowledge through the design of novel or innovative artifacts, and analyzing the artifacts’ use or performance. We present an analysis of 40 DSR doctoral theses completed in Australia for the period 2006-2017. Our purpose is to understand how DSR is applied by the IS community and one critical source of information is the work of doctoral candidates. How candidates are guided by the literature, the artifacts produced and their evaluation provide a window into this understanding. We selected the theses from the Australian national repository and analyzed their content. The findings suggest: 1) DSR is evolving and maturing in this cohort but most candidates fail to enunciate and understand the underlying philosophy of their research approach, 2) the use of relevant guidance is still developing, and 3) the capacity of candidates to theorize about their work remains a challenge, possibly due to problems of scoping DSR projects and the ensuing time constraints. In spite of their recognition/appreciation of the need for evaluation of the artifacts, the candidates’ comprehension that the designs also require evaluation is questionable. As in many other areas of IS research, nomenclature in DSR remains a problem and the whole IS community has a role to strive for consistency. This paper contributes towards our understanding of the challenges and advantages of DSR as a research approach for postgraduate studies and offers recommendations to the DSR community.
Mobile Health (mHealth) Channel Preference: An Integrated Perspective of Approach-Avoidance Beliefs and Regulatory Focus
Liwei Chen, Aaron Baird, Arun Rai
The mobile health (mHealth) channel has been suggested to be effective in assisting with chronic disease management. However, little is known about the mHealth channel preferences of consumers who may be vulnerable to chronic disease. Integrating the lens of approach-avoidance beliefs with regulatory focus theory, we: 1) focus on mHealth channel preference (CHANNEL) as our dependent variable, 2) identify perceived mHealth usefulness (PU) as an approach belief and perceived mHealth risk (RISK) as an avoidance belief, and 3) develop hypotheses pertaining to the how the regulatory focus of the individual (operationalized as perceived vulnerability to chronic disease, VULN) moderates the impacts of PU and RISK on CHANNEL. Based on analyses using structural equation modeling (SEM) of survey data collected from 954 individuals in the U.S., we find that, compared to a promotion regulatory focus (low VULN), a prevention regulatory focus (high VULN) amplifies the effect of RISK on CHANNEL and suppresses the effect of PU on CHANNEL. We discuss the implications of our findings for theory, practice, and future research related to mHealth channel preferences.
Against Theory: With Apologies to Feyerabend
In his seminal book “Against Method”, Feyerabend (1975) takes issue with scientists’ preoccupation with method. This paper takes a similar stand but instead of ‘method’ it focuses on ‘theory’. For Feyerabend, it was scientists and scholars unhealthy obsession with method; in this paper, it is the Information Systems field’s fixation with theory and the problems this causes. The paper examines where the theory focus came from, why it has been so widely adopted, what the deleterious consequences of this focus are, and some recommendations on the field could move forward. Along the way paper delivers a cautionary tale of what might happen to the field if it simply continues down the same path without changing course. This essay is, fundamentally, meant to spark debate, in the same vein as Feyerabend’s book was.
Business on Chain: A Comparative Case Study of Five Blockchain-Inspired Business Models
Alain Chong, Eric Lim, Xiuping Hua, Sunny Zheng, and Chee-Wee Tan
Blockchain, despite its origin as the underlying infrastructure for value transfer in the era of cryptocurrency, has been touted as the main disruptive force in modern businesses. Blockchain is embedded with the capability to chronologically capture and store transactional data in a standardized and tamper-proof format that is transparent to all stakeholders involved in the transaction. This in turn has prompted companies to rethink pre-existing business practices, thereby yielding a myriad of fascinating business models anchored on blockchain. In this study, we advance contemporary knowledge of business applications of blockchain by drawing on the theoretical lens of digital business model and value configuration to decipher how pioneers in this space are leveraging blockchain to create and capture value. Through a comparative, multiple case study approach, we analyzed five companies in mainland China that have rolled out blockchain initiatives. From our case analysis, we derived a typology of five blockchain-inspired business models, each of which embodies distinctive logics for market differentiation. For each business model, we proffer insights into its value creation logic, its value capturing mechanism, and the challenges that could threaten its longer-term viability. Grounded in our findings, we discussed key implications for theory and practice.
Privacy-Preserving Data Certification in the Internet of Things: Leveraging Blockchain Technology to Protect Sensor Data
Mathieu Chanson, Andreas Bogner, Dominik Bilgeri, Elgar Fleisch, and Felix Wortmann
A constantly growing pool of smart, connected Internet of Things (IoT) devices poses completely new challenges for business regarding security and privacy. In fact, the widespread adoption of smart products might depend on the ability of organizations to offer systems that ensure adequate sensor data integrity while guaranteeing sufficient user privacy. In light of these challenges, previous research indicates that blockchain technology may be a promising means to mitigate issues of data security arising in the IoT. Building upon the existing body of knowledge, we propose a design theory, including requirements, design principles, and features, for a blockchain-based sensor data protection system (SDPS) that leverages data certification. We then design and develop an instantiation of an SDPS (CertifiCar) in three iterative cycles that prevents the fraudulent manipulation of car mileage data. Furthermore, we provide an ex-post evaluation of our design theory considering CertifiCar and two additional use cases in the realm of pharmaceutical supply chains and energy microgrids. The evaluation results suggest that the proposed design ensures the tamper-resistant gathering, processing, and exchange of IoT sensor data in a privacy-preserving, scalable, and efficient manner.
Self-Organising in Blockchain Infrastructures: Generativity Through Shifting Objectives and Forking
Jonas Andersen and Claire Ingram Bogusz
The potential of blockchain to transform organising has already begun to be seen in contexts from financial services to supply chain management. The Bitcoin blockchain is thought to be the first case of an increasingly generative and automated way of organising—and one in which the blockchain itself plays a crucial role in how, and which, organising objectives are realised. The specific properties of blockchain infrastructures–distribution of control, openness to manipulation, and generativity of the underlying source code—make it an ideal case to study emergent patterns of self-organising in the absence of centralised governance. This paper investigates the phenomenon of self-organising through a study of forking in the Bitcoin blockchain infrastructure between 2010 and 2016. It adds to the emerging body of research on digital infrastructures, and particularly blockchain infrastructures, by conceptualising forking as a mechanism of self-organising in blockchain infrastructures, and specifically the role of: 1) the underlying infrastructure; 2) the scale of code changes; 3) organising objectives; and 4) collective adoption, whether specific or general, in self-organising. It further contextualises these findings in extant work on digital infrastructures, offers a guide for designers of blockchain infrastructures and proposes the concept of ‘generative mirroring’ as a pattern wherein blockchain infrastructures and organising adaptively co-evolve.
How Paternalistic Leadership Influences IT Security Policy Compliance: The Mediating Role of Social Bond
Gengzhong Feng, Jiawen Zhu, Nengmin Wang, Huigang Liang
Leadership plays an important role in changing employees’ behavior in general. This paper aims to investigate the relationship between Paternalistic Leadership and employees’ Information Security Policy (ISP) Compliance. Social Bond Theory is adopted as the theoretical lens to explain how Paternalistic Leadership influences ISP Compliance via the formation of Social Bond. We developed a research model and tested it by 314 pair-wise data from employees and their supervisors in organizations. The results show that all three dimensions of Paternalistic Leadership – Benevolence, Morality and Authoritarianism – positively influence employees’ ISP compliance. Social Bond partially mediates the effects of Benevolence and Morality on Compliance Intention. Overall, this paper reveals the positive effect of Paternalistic Leadership in improving ISP Compliance and the mediating role of Social Bond in explaining the impact of Paternalistic Leadership on ISP Compliance. In addition, the mediation effect of Social Bond suggests that the non-IT related routine behavior of leaders can also affect employees’ ISP compliance by forming social bond with employees.
The Role of Basic Human Values in Knowledge Sharing: How Values Shape the Post-Adoptive Use of Electronic Knowledge Repositories
Stefan Tams, Alina Maria Dulipovici, Jason B. Thatcher, Kevin Craig, Mark Srite
A growing body of literature examines how to elicit knowledge contributions to electronic knowledge repositories (EKRs) with the goal of helping organizations increase implementation benefits. While this literature has explained in detail the initial EKR adoption by knowledge contributors, it has not yet examined the drivers of post-adoptive EKR usage for contributing knowledge. It is post-adoptive EKR usage, such as innovative feature use, that holds the potential to result in richer contributions to EKRs. To aid understanding of how to unlock the benefits of EKRs for organizations, this study examines the impact of basic human values on one type of post-adoptive behavior that goes well beyond basic usage: trying to innovate with EKR features. We develop a research model that integrates human values and trying to innovate with an EKR, suggesting that such human values as an emphasis of independent thought and action can lead to trying to innovate by increasing the frequency of EKR usage. Data collected from 233 knowledge workers supported the model. Our findings shed light on how to encourage innovative EKR usage, and they underscore the importance of human values for the success of knowledge management initiatives.
Measuring Risk From IT Initiatives Using Implied Volatility
Dawes Zhang and Barrie Nault
We propose an under-recognized measure to capture changes in firm risk from information technology (IT) announcements: implied volatility (IV) from a firm’s exchange-traded options. An IV is obtained from a priced stock option and represents the option market’s expectation of the firm’s average stock return volatility over the remaining duration of the option. Using the change in IV around IT announcements, we can directly assess changes in IT-induced firm risk. IVs are straightforward to obtain, and are forward-looking based on option market investors’ estimates of future stock return volatility. They do not rely on historical volatility that is confounded with other events. In addition, options have different expiration dates–each with an IV–allowing us to distinguish between short- and long-term risk. We show how a change in IV can be employed to assess changes in short- and long-term firm risk from IT announcements, and demonstrate this methodological innovation empirically using a set of IT announcements that have been utilized in previous studies.
Medical Crowdsourcing: Harnessing the “Wisdom of the Crowd” to Solve Medical Mysteries
Indika Dissanayake, Sridhar P. Nerur, Rahul Singh, Yang W. Lee
Medical crowdsourcing offers hope to patients who suffer from complex health conditions that are difficult to diagnose. Such platforms empower patients to harness the “wisdom of the crowd” by providing access to a vast pool of diverse medical knowledge. Greater participation in crowdsourcing increases the likelihood of evolving a correct solution. However, more participation also leads to increased “noise”, which makes identifying the most likely solution from a broader pool of recommendations (i.e., diagnostic suggestions) difficult. The challenge for medical crowdsourcing platforms is to increase participation of both patients and solution providers, while simultaneously increasing the efficacy and accuracy of solutions. The primary objectives of this study are to: a) investigate means to enhance the solution pool by increasing participation of solution providers referred to as “medical detectives”; and b) explore ways to select the most likely diagnosis from a set of alternative solutions. Specifically, we assessed the impact of objective factors (e.g., rewards and duration of undetected chronic illness) and inferred factors (e.g., emotional tones and perceived quality of the case) on the number of detectives who participated in the case. We then used multiple evaluation methods (e.g., text clustering and prediction market) and pooled knowledge related to detectives’ diagnoses to determine the most likely solution. Our results suggest that using multiple methods for evaluation of recommendations leads to better predictions. Furthermore, cases with higher perceived quality and more negative emotional tones (e.g., sadness, fear, and anger) attract more detectives. Our findings have strong implications for research and practice.
Beautiful is Good and Good is Reputable: Multi-Attribute Charity Website Evaluation and Reputation Formation Under the Halo Effect
Dong-Heon Kwak, K. Ramamurthy, Derek Nazareth
The halo effect has been extensively used to understand how people make judgments about quality of an object. Also, the halo effect has been known to occur when people evaluate multi-attribute objects. Although websites consist of multiple dimensions and multiple attributes, prior research in information systems has not paid much attention on how people evaluate multi-attribute websites and the types of salient halos that exist in their evaluation. Furthermore, there is little research that has investigated the formation of initial reputation toward an unknown object under the halo effect. Based on these two research gaps, the purposes of this study are to identify if there is evidence of salient halos in evaluating multi-attributes websites and to theorize initial reputation formation. To accomplish these research objectives, we introduce a framework for classifying halos based on attributes and dimensions. Also, this study employs charity websites as a multi-attribute donation channel consisting of three attributes of information content quality (mission information, financial information, and donation assistance information) and four attributes of system quality (navigability, download speed, visual aesthetics, and security). Based on the proposed framework, this study proposes four types of halos that are relevant to charity website evaluation —collective halo (attribute-to-attribute), aesthetics halo (attribute-to-dimension), reciprocal quality halo (dimension-to-dimension), and quality halo (dimension-to-dimension). The results of structural equation modeling and other analyses show evidence of the various proposed halos.
The Mediating Role of Psychological Empowerment in Information Security Compliance Intention
Gurpreet Dhillon, Yurita Yakimin Abdul Talib, Winnie Picoto
The issue of employee noncompliance with information security policies is universal. Non-compliance increases the possibility of invasive information security threats, which result in compromising organizational assets. Although research has empirically revealed a relationship between structural empowerment and employee intention to comply with the information security policy, the mediating role of psychological empowerment in the relationship has received limited attention. This study conceptualizes the role of psychological empowerment as a mediator between structural empowerment and intention to comply with information security policy. It suggests that empowerment work structures, which include information security education, training, and awareness (SETA), access to information security strategic goals, and participation in information security decision making all increase employee feeling of being psychologically empowered, which consequently leads to positive intention to comply with information security policy.
A Framework for Validating Information Systems Research Based on a Pluralist Account of Truth and Correctness
John Mingers, Craig Standing
Research in information systems includes a range of approaches which make varied contributions in terms of knowledge, understanding, or practical developments. In these days of “fake news” and spurious internet content, scholarly research needs to be able to demonstrate its validity – are its finding true, or its recommendations correct? We argue that there are fundamental validation criteria that can be applied to all research approaches despite their apparent diversity and conflict. These stem from current views of the nature of truth, and the related but wider concept correctness, within philosophy. There has been much debate about the nature of truth – is it correspondence, coherence, consensual or pragmatic? Current debates revolve around the idea of a pluralist view of truth – that there are different forms of truth depending on the context or domain. Related to truth is the wider concept of correctness – propositions may be true but correctness can also be applied to actions, performances or behavior for which truth is not appropriate. We develop a framework for research validity and apply it to a range of research forms including positivist, interpretive, design science, critical and action-oriented. The benefits are: i) a greater and more explicit focus on validity criteria will produce better research; ii) having a single framework can provide some commonality between what at times seem conflicting approaches to research; iii) having criteria made explicit should encourage debate and further development. The framework is applied to a variety of empirical papers employing varied research approaches.
Can secure behaviors be contagious? A two-stage investigation of the influence of herd behavior on security decisions
Ali Vedadi, Merrill Warkentin
IT users often make information security-related decisions in complex and multidimensional environments, which could lead to phenomena like behavioral anomalies. For instance, under uncertain circumstances, users may discount their own limited information about a security technology and make their adoption decisions based on what the majority of users’ decisions are in this regard. In this context, imitation can become a legitimate and rational strategy for making security-related decisions. Current behavioral security theories generally assume that users possess sufficient information about security technologies before making security-related decisions. This theory assumption limits our understanding of how security decisions are made in various real-world circumstances. Our research is focused on security behaviors under uncertain circumstances. We investigate how providing popularity information can trigger herd behavior and can subsequently influence security behaviors. We also provide insights into security-related decisions that are influenced by herd mentality and whether they persist over time. Additionally, we conceptualize and operationalize two constructs that can be used in future research to better examine post-adoption security behaviors. The findings of this multi-stage experiment show that in uncertain circumstances, when users are aware of the widespread use of a certain security technology, they develop a significantly higher intention to engage in protection-motivated behaviors. Furthermore, the results show that at the post-adoption stage, users rely more heavily on their own information about their continuous use of security technologies and put less emphasis the herd-related factors.
Why we cannot resist our smartphones: Investigating compulsive use of mobile SNS from a stimulus-response-reinforcement perspective
Chuang Wang, Matthew K.O. Lee
Compulsive smartphone use has drawn extensive social attention due to serious and even fatal outcomes. However, there has been little theory-driven research systematically investigating the mechanism of compulsive behavior in the use of smartphones. Although a significant line of literature exists in the area of personal-computer based technology addiction, the mechanism underpinning compulsive smartphone use differs significantly because the specific and unique characteristics of smartphones (e.g., high mobility, instant connection, and ubiquitous access) have given rise to a fundamentally different usage context with new usage behavioral patterns. Motivated to comprehensively theorize this issue, we first define compulsive behavior in the use of smartphone, mobile SNS in particular, and then extend stimulus-response-reinforcement framework to investigate the theoretical network of compulsive use of mobile SNS. An online survey data from 368 active mobile SNS users in China are used to empirically test and validate the proposed model and hypotheses. The results indicate that both positive (e.g., gratification and positive affect) and negative reinforcements (e.g., withdrawal and negative affect), as well as compensatory component (e.g., emotional relief), evoke the feeling of urge that further leads to compulsive use of mobile SNS. The positive effects of interactivity as an incentive stimulus on those reinforcements and compulsive mobile SNS use are also found to be significant.
Through Whose Eyes? The Critical Concept of Researcher Perspective
Roger Clarke, Robert Davison
In this article, we explore the notion of ‘researcher perspective’, by which we mean the viewpoint from which the researcher observes phenomena in any specific research context. Inevitably, the adoption of a particular viewpoint means that the researcher privileges the interests of one or more stakeholders, while downplaying the interests of other stakeholders. Preliminary empirical analysis of a corpus of 659 articles published in three separate years in AIS Basket of 8 journals, undertaken in preparation for the present paper, revealed that around 90% of articles a) adopted a single-perspective approach, b) were committed solely to the interests of the entity central to the research design, and c) considered only economic aspects of the phenomena investigated in the research. Taken together, these three characteristics are unhealthy for the discipline and likely to lead to the neglect of important research opportunities. We suggest that the principle of triangulation be applied not only to data sources and research methods, but also to researcher perspectives, and that a consequent broadening of the IS discipline's scope is essential. We conclude the article with prescriptive recommendations for the practice of research that is relevant to multiple stakeholders.
A Field Based View on Gender in the Information Systems Discipline: Preliminary Evidence and an Agenda for Change
Eleanor Loiacono, Babita Gupta, Iaroslava (Gloria) Dutchak, Jason B. Thatcher
Gender disparities are an often-cited concern about the information technology (IT) workforce in general, and technology focused professions, such as Information Systems, in particular. These worries have been underscored by evidence from practice, with low rates of participation by women in the IT workforce, and exacerbated by more recent events in Silicon Valley, with many male leaders and professionals suggesting women lack an aptitude for technical work. Motivated by events in practice, and recent events in our own discipline, this editorial considers how gender shapes the careers of women and men in Information Systems academe, in relation to their employing institutions and to the Association for Information Systems (AIS). Based on a survey of 279 AIS members, we draw insights into whether women and men feel equitably treated in terms of support, job satisfaction, opportunities for career advancement, quality of mentoring, and sexual harassment within their interactions in the AIS and at their employing university. We found that women and men report different experiences in the workplace, in the professional association, and in their opportunities for advancement in their careers. Given evidence of gender differences and sexual harassment, we offer an agenda for change within the AIS and call to action to aim for gender equity within the Information Systems community.
Value Co-creation for Service Innovation: Examining the Relationships between Service Innovativeness, Customer Participation, and Mobile App Performance
Hua (Jonathan) Ye, Atreyi Kankanhalli
Service innovation is critical to firms' competitive advantage and thus, firms desire to make their services more and more innovative. However, the relationship between a new service’s innovativeness and its performance is unclear. Conflicting findings and related literature suggest that service innovativeness is multi-dimensional and its impact on performance could be non-linear. Yet, there has been limited research on these aspects, both theoretically and empirically. Further, customers play an important role in service innovation, but prior research has mainly considered them as inputs to value creation, which may not capture their precise role. Motivated thus, and drawing on the service-dominant (S-D) logic, we propose two dimensions of service innovativeness, novelty and intensity, which influence new service performance differentially, and posit that customers are a part of the value co-creation process affecting new service performance. Consequently, we develop a model linking service innovativeness dimensions and customer participation to new service performance. The model was tested using a panel dataset of 234 mobile apps over 14 months. The results indicate important asymmetries in the impacts of novelty and intensity on mobile app performance. As proposed, novelty shows a curvilinear (negative quadratic) relationship, whereas intensity shows a positive linear relationship with mobile app performance. Furthermore, customer participation has a positive impact on mobile app performance, as well as positively moderating both the effects of intensity and novelty on mobile app performance. The implications for research and practice are discussed.
Synthesizing and Integrating Research on IT-Based Value Co-Creation: A Meta-Analysis
Markus Mandrella, Simon Trang, Lutz M. Kolbe
IT value research has witnessed growing interest in the use of joint IT resources and capabilities following recent shifts in market competition from the firm to the network level. Despite research efforts in this domain, there remain substantial inconsistencies in the IT value co-creation literature regarding the effect of inter-organizational IT on business value and the role of methodological and contextual factors. Drawing on the resource-based view and the relational view of the firm, we conducted a meta-analysis to synthesize and integrate the body of knowledge on IT-based value co-creation. Our analysis of 80 studies – encompassing 21,843 observations – highlights the value-generating effect of four inter-organizational IT capabilities: IT-based relation-specific assets, IT-based knowledge sharing, IT-based complementary capabilities, and IT-based governance. Insights from our preliminary meta-analysis reveal that contradictory findings are driven by the conceptualization of IT variables as inter-organizational IT resources. A further moderator meta-analysis explains divergent empirical findings in the literature. We find that the use of relational-level value and perceptual measures, use of single respondents, and the context of developing countries and supply chain and networked interdependencies result in larger estimates of business value. In contrast, the use of network-level, firm-level, and objective measures; use of matched-pair approaches; and the context of developed countries and pooled interdependencies result in smaller estimates. Overall, this paper provides clarity and structure to the current understanding of the research field by providing explanations for inconsistent findings as well as a foundation for future research and theory development.
Predicting Intention to Participate in Socially Responsible Collective Action in a Social Networking Website Group
Victor Jengchung Chen, Timothy McBush Hiele, Adam Kryszak, William H. Ross
The present study used the belief-desire-intention (BDI) model to predict group members’ intention (“we-intention”) to participate in using a social networking site (SNS) for collective action. Participants reported their beliefs about social influence processes, including a subjective norm, a group norm, and social identity; they also reported their beliefs about using an SNS for a charitable collective action, which was socially responsible - perceived corporate social responsibility (CSR). The study applied this integrated research framework in the context of a Facebook group called KolorujeMY with an interest in social causes (e.g., repairing orphanages in Poland). Moreover, the structural equation modeling results indicated that social identity had a positive and direct effect on we-intention to use an SNS for collective action. Perceived CSR also had a positive and significant impact on this we-intention. Similarly, desire had a positive, significant, and large effect on we-intention to use SNS for collective action. The results also indicated that desire partially mediated the relationship between the social influence beliefs and we-intention. Overall, this study provides insights in the understanding of the impact of social influence processes, the role of desire, and perceived CSR beliefs toward predicting we-intentions in a social networking environment.