首页 > 最新文献

Information Systems Frontiers最新文献

英文 中文
Digital Technologies and Supply Chain Resilience: A Resource-Action-Performance Perspective 数字技术与供应链弹性:资源-行动-绩效视角
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-26 DOI: 10.1007/s10796-025-10595-1
Lin Wu, Zhewei Zhang, Jimmy Huang, I-Hsuan Su, Shuang Tian

This study empirically examines how various digital technologies individually and collectively contribute to supply chain resilience (SCRes) in coping with major disruptions. While there is no shortage in the IS literature to study the use of digital technologies, current trend is prevailed with either the investigation of single technology or treating all deployed technologies as an undifferentiated whole. Therefore, theoretically, we aim to address the lack of conceptual clarity and insights in the use of multiple digital technologies in tandem. To operationalize this research, we deploy and build on the Resource-Action-Performance (RAP) perspective, and categorize widely used digital technologies into two, namely, resource-oriented and action-oriented technologies. We then empirically investigate how these two categories of digital technologies are orchestrated to help maintain and improve SCRes for manufacturing firms during major disruptions, in this case, Covid-19. The results show a positive effect of resource-oriented technologies on SCRes, which is mediated by action-oriented technologies. Our contributions to the IS literature are threefold. First, our study provides important theoretical insights by analytically separating and categorizing different digital technologies as a means to enrich our understanding in the use of multiple technologies in tandem. Second, we offer empirical evidence to elaborate different functions and values that different digital technologies individually and collectively contributed to firm’s capability in SCRes and its ability to cope with major disruptions. Third, our study provides practical insights into utilizing digital tools to maintain business continuity in uncertain environments.

本研究实证考察了各种数字技术如何单独和共同促进供应链弹性(SCRes)应对重大中断。虽然研究数字技术使用的信息系统文献并不缺乏,但目前的趋势是要么调查单一技术,要么将所有部署的技术视为一个无差别的整体。因此,从理论上讲,我们的目标是解决在串联使用多种数字技术时缺乏概念清晰度和洞察力的问题。为了使本研究可操作性,我们部署并构建了资源-行动-绩效(Resource-Action-Performance, RAP)视角,并将广泛使用的数字技术分为两类,即资源导向技术和行动导向技术。然后,我们实证研究了如何协调这两类数字技术,以帮助制造企业在重大中断(在本例中是Covid-19)期间维持和改善scre。研究结果表明,资源导向技术对企业绩效有正向影响,并在行动导向技术的作用下起到中介作用。我们对IS文献的贡献有三个方面。首先,我们的研究通过分析分离和分类不同的数字技术提供了重要的理论见解,作为一种丰富我们对多种技术串联使用的理解的手段。其次,我们提供了经验证据来阐述不同的功能和价值,即不同的数字技术单独和集体地对企业在scre中的能力及其应对重大中断的能力做出了贡献。第三,我们的研究为利用数字工具在不确定环境中维持业务连续性提供了实用的见解。
{"title":"Digital Technologies and Supply Chain Resilience: A Resource-Action-Performance Perspective","authors":"Lin Wu, Zhewei Zhang, Jimmy Huang, I-Hsuan Su, Shuang Tian","doi":"10.1007/s10796-025-10595-1","DOIUrl":"https://doi.org/10.1007/s10796-025-10595-1","url":null,"abstract":"<p>This study empirically examines how various digital technologies individually and collectively contribute to supply chain resilience (SCRes) in coping with major disruptions. While there is no shortage in the IS literature to study the use of digital technologies, current trend is prevailed with either the investigation of single technology or treating all deployed technologies as an undifferentiated whole. Therefore, theoretically, we aim to address the lack of conceptual clarity and insights in the use of multiple digital technologies in tandem. To operationalize this research, we deploy and build on the Resource-Action-Performance (RAP) perspective, and categorize widely used digital technologies into two, namely, resource-oriented and action-oriented technologies. We then empirically investigate how these two categories of digital technologies are orchestrated to help maintain and improve SCRes for manufacturing firms during major disruptions, in this case, Covid-19. The results show a positive effect of resource-oriented technologies on SCRes, which is mediated by action-oriented technologies. Our contributions to the IS literature are threefold. First, our study provides important theoretical insights by analytically separating and categorizing different digital technologies as a means to enrich our understanding in the use of multiple technologies in tandem. Second, we offer empirical evidence to elaborate different functions and values that different digital technologies individually and collectively contributed to firm’s capability in SCRes and its ability to cope with major disruptions. Third, our study provides practical insights into utilizing digital tools to maintain business continuity in uncertain environments.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"99 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143712756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revealing the Role of Intra-household Dynamics in Computer Adoption: An Inductive Theorization Approach Using Machine Learning in the Indian Context 揭示家庭内部动态在计算机采用中的作用:在印度背景下使用机器学习的归纳理论方法
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-17 DOI: 10.1007/s10796-025-10594-2
Sharada Sringeswara, Jang Bahadur Singh, Sujeet Kumar Sharma, Sirish Kumar Gouda

Research on technology adoption has focused on individual, organizational, and institutional factors, yet adoption within households in developing countries like India remains underexplored. To address this gap, we utilized a large-scale national household survey and a machine learning-based inductive approach to uncover the complex relationship between intra-household dynamics and computer adoption. Our study identified household education externalities, the education level of women in the family, and the presence of teenage children as key factors influencing computer adoption. Our decision tree analysis revealed the intricate combinations of predictors that impact adoption, offering nuanced explanations of this complex phenomenon. Our findings can inform the development of customer-oriented marketing strategies and customized intervention programs that address cost, access, and education inequalities hindering household computer adoption, benefiting computer makers and government policymakers.

对技术采用的研究主要集中在个人、组织和制度因素上,但在印度等发展中国家,家庭采用技术的研究仍未得到充分探索。为了解决这一差距,我们利用大规模的全国家庭调查和基于机器学习的归纳方法来揭示家庭内部动态与计算机采用之间的复杂关系。我们的研究确定了家庭教育外部性、家庭中女性的教育水平和青少年儿童的存在是影响计算机采用的关键因素。我们的决策树分析揭示了影响采用的预测因素的复杂组合,为这一复杂现象提供了细致入微的解释。我们的研究结果可以为以客户为导向的营销策略和定制干预方案的发展提供信息,以解决阻碍家用电脑采用的成本、获取和教育不平等问题,从而使电脑制造商和政府决策者受益。
{"title":"Revealing the Role of Intra-household Dynamics in Computer Adoption: An Inductive Theorization Approach Using Machine Learning in the Indian Context","authors":"Sharada Sringeswara, Jang Bahadur Singh, Sujeet Kumar Sharma, Sirish Kumar Gouda","doi":"10.1007/s10796-025-10594-2","DOIUrl":"https://doi.org/10.1007/s10796-025-10594-2","url":null,"abstract":"<p>Research on technology adoption has focused on individual, organizational, and institutional factors, yet adoption within households in developing countries like India remains underexplored. To address this gap, we utilized a large-scale national household survey and a machine learning-based inductive approach to uncover the complex relationship between intra-household dynamics and computer adoption. Our study identified household education externalities, the education level of women in the family, and the presence of teenage children as key factors influencing computer adoption. Our decision tree analysis revealed the intricate combinations of predictors that impact adoption, offering nuanced explanations of this complex phenomenon. Our findings can inform the development of customer-oriented marketing strategies and customized intervention programs that address cost, access, and education inequalities hindering household computer adoption, benefiting computer makers and government policymakers.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"61 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143641117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The More, the Better? Effects of Same-Side Network Externalities on Customer Loyalty in Ride-Hailing Aggregation Platforms 越多越好?同侧网络外部性对打车聚合平台客户忠诚度的影响
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-12 DOI: 10.1007/s10796-025-10593-3
Yu Cao, Xiang Li, Furou Kou, Guangyu Wan

This study explores the dynamics of customer loyalty in ride-hailing aggregation platforms, a burgeoning segment of the sharing economy that consolidates multiple service providers into a unified interface. Leveraging perceived value theory, we analyze the “double-edged sword” effect of same-side network externalities—how perceived customer network size impacts customer loyalty in a non-linear, inverted U-shaped pattern. Data from 543 aggregation platform users reveal that moderate levels of perceived customer network size optimize loyalty, balancing the positive effects of increased utility and trust with the negative impacts of network congestion. Moreover, perceived value mediates this curvilinear relationship, while perceived driver network size—a measure of cross-side network externalities—intensifies its curvature, highlighting the critical role of interdependencies between platform participants. Our arguments and results contribute to the literature on customer loyalty on platforms, and can inform the strategic decisions of platforms that rely on same side network externalities for value creation.

本研究探讨了打车聚合平台中客户忠诚度的动态变化,这是共享经济中一个新兴的细分市场,它将多个服务提供商整合到一个统一的界面中。利用感知价值理论,我们分析了同侧网络外部性的 "双刃剑 "效应--感知到的客户网络规模如何以非线性的倒 U 型模式影响客户忠诚度。来自 543 名聚合平台用户的数据显示,适度的感知客户网络规模可以优化忠诚度,在增加效用和信任的正面效应与网络拥堵的负面影响之间取得平衡。此外,感知价值对这种曲线关系起到了中介作用,而感知驱动力网络规模--一种衡量横向网络外部性的指标--则加剧了这种曲线关系,突出了平台参与者之间相互依存关系的关键作用。我们的论点和结果为有关平台客户忠诚度的文献做出了贡献,并可为依赖同侧网络外部性创造价值的平台的战略决策提供参考。
{"title":"The More, the Better? Effects of Same-Side Network Externalities on Customer Loyalty in Ride-Hailing Aggregation Platforms","authors":"Yu Cao, Xiang Li, Furou Kou, Guangyu Wan","doi":"10.1007/s10796-025-10593-3","DOIUrl":"https://doi.org/10.1007/s10796-025-10593-3","url":null,"abstract":"<p>This study explores the dynamics of customer loyalty in ride-hailing aggregation platforms, a burgeoning segment of the sharing economy that consolidates multiple service providers into a unified interface. Leveraging perceived value theory, we analyze the “double-edged sword” effect of same-side network externalities—how perceived customer network size impacts customer loyalty in a non-linear, inverted U-shaped pattern. Data from 543 aggregation platform users reveal that moderate levels of perceived customer network size optimize loyalty, balancing the positive effects of increased utility and trust with the negative impacts of network congestion. Moreover, perceived value mediates this curvilinear relationship, while perceived driver network size—a measure of cross-side network externalities—intensifies its curvature, highlighting the critical role of interdependencies between platform participants. Our arguments and results contribute to the literature on customer loyalty on platforms, and can inform the strategic decisions of platforms that rely on same side network externalities for value creation.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"26 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143599857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Does Leadership Approach Matter? Examining Behavioral Influences of Leaders on Employees’ Information Security Compliance 领导方法重要吗?研究领导者对员工信息安全合规性的行为影响
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-08 DOI: 10.1007/s10796-025-10592-4
Gurvirender P.S. Tejay, Marcus Winkfield

Organizations continue to struggle with motivating employee compliance with information systems (IS) security protocols despite implementing technical and managerial strategies. This study examines the critical role of leadership behaviors in fostering security compliance among employees. We assert that effective leadership can significantly influence adherence to IS security controls. Grounded in expectancy theory, our research model investigates how task-oriented and relationship-oriented leadership behaviors impact perceived security efforts and performance, ultimately shaping expected security outcomes. Data were collected from 407 participants through a cross-sectional survey, and structural equation modeling was employed for analysis. The findings reveal that task-oriented leadership is particularly effective in motivating IS security compliance. Furthermore, individual-level analyses highlight task-oriented leadership as the sole behavior demonstrating a direct relationship with the expected security outcomes of compliance. These insights enrich our understanding of security compliance behaviors as primarily driven by extrinsic motivation. We encourage future research to explore the role of intrinsic motivators and the potential indirect effects of relationship-oriented leadership behaviors on IS security policy compliance. By illuminating the behavioral dynamics of leadership, this study paves the way for organizations to enhance their IS security programs and cultivate a culture of compliance.

尽管实施了技术和管理策略,组织仍然在努力激励员工遵守信息系统(IS)安全协议。本研究探讨了领导行为在促进员工安全合规方面的关键作用。我们认为,有效的领导可以显著影响遵守IS安全控制措施。基于期望理论,我们的研究模型探讨了任务导向和关系导向的领导行为如何影响感知的安全努力和绩效,最终形成预期的安全结果。通过横断面调查收集407名参与者的数据,采用结构方程模型进行分析。研究结果表明,任务导向的领导在激励is安全合规方面特别有效。此外,个人层面的分析强调了任务导向的领导作为唯一的行为,显示了与合规性的预期安全结果的直接关系。这些见解丰富了我们对主要由外部动机驱动的安全遵从性行为的理解。我们鼓励未来的研究探索内在激励因素的作用,以及关系导向的领导行为对信息系统安全政策合规的潜在间接影响。通过阐明领导的行为动力学,本研究为组织加强其信息系统安全计划和培养合规文化铺平了道路。
{"title":"Does Leadership Approach Matter? Examining Behavioral Influences of Leaders on Employees’ Information Security Compliance","authors":"Gurvirender P.S. Tejay, Marcus Winkfield","doi":"10.1007/s10796-025-10592-4","DOIUrl":"https://doi.org/10.1007/s10796-025-10592-4","url":null,"abstract":"<p>Organizations continue to struggle with motivating employee compliance with information systems (IS) security protocols despite implementing technical and managerial strategies. This study examines the critical role of leadership behaviors in fostering security compliance among employees. We assert that effective leadership can significantly influence adherence to IS security controls. Grounded in expectancy theory, our research model investigates how task-oriented and relationship-oriented leadership behaviors impact perceived security efforts and performance, ultimately shaping expected security outcomes. Data were collected from 407 participants through a cross-sectional survey, and structural equation modeling was employed for analysis. The findings reveal that task-oriented leadership is particularly effective in motivating IS security compliance. Furthermore, individual-level analyses highlight task-oriented leadership as the sole behavior demonstrating a direct relationship with the expected security outcomes of compliance. These insights enrich our understanding of security compliance behaviors as primarily driven by extrinsic motivation. We encourage future research to explore the role of intrinsic motivators and the potential indirect effects of relationship-oriented leadership behaviors on IS security policy compliance. By illuminating the behavioral dynamics of leadership, this study paves the way for organizations to enhance their IS security programs and cultivate a culture of compliance.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"39 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143575378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding Human-AI Augmentation in the Workplace: A Review and a Future Research Agenda 理解人类在工作场所的人工智能增强:回顾和未来的研究议程
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-04 DOI: 10.1007/s10796-025-10591-5
Trinh Nguyen, Amany Elbanna

The relationship between humans and artificial intelligence has sparked considerable debate and polarized opinions. A significant area of focus in this discourse that has garnered research attention is the potential for humans and AI to augment one another in order to enhance outcomes. Despite the increasing interest in this subject, the existing research is currently fragmented and dispersed across various management disciplines, making it challenging for researchers and practitioners to build upon and benefit from a cohesive body of knowledge. This study offers an organized literature review to synthesize the current literature and research findings, thereby establishing a foundation for future inquiries. It identifies three emerging themes related to the nature, impacts, and challenges of Human-AI augmentation, further delineating them into several associated topics. The study presents the research findings related to each theme and topic before proposing future research agenda and questions.

人类和人工智能之间的关系引发了相当大的争论和两极分化的观点。这一论述中引起研究关注的一个重要领域是人类和人工智能相互增强以增强结果的潜力。尽管对这一主题的兴趣日益浓厚,但现有的研究目前分散在各种管理学科中,使研究人员和实践者难以建立在一个有凝聚力的知识体系之上并从中受益。本研究通过有组织的文献综述,综合现有文献和研究成果,为今后的研究奠定基础。它确定了与人类-人工智能增强的性质、影响和挑战相关的三个新兴主题,并进一步将它们划分为几个相关主题。本研究在提出未来的研究议程和问题之前,先介绍与每个主题和课题相关的研究成果。
{"title":"Understanding Human-AI Augmentation in the Workplace: A Review and a Future Research Agenda","authors":"Trinh Nguyen, Amany Elbanna","doi":"10.1007/s10796-025-10591-5","DOIUrl":"https://doi.org/10.1007/s10796-025-10591-5","url":null,"abstract":"<p>The relationship between humans and artificial intelligence has sparked considerable debate and polarized opinions. A significant area of focus in this discourse that has garnered research attention is the potential for humans and AI to augment one another in order to enhance outcomes. Despite the increasing interest in this subject, the existing research is currently fragmented and dispersed across various management disciplines, making it challenging for researchers and practitioners to build upon and benefit from a cohesive body of knowledge. This study offers an organized literature review to synthesize the current literature and research findings, thereby establishing a foundation for future inquiries. It identifies three emerging themes related to the nature, impacts, and challenges of Human-AI augmentation, further delineating them into several associated topics. The study presents the research findings related to each theme and topic before proposing future research agenda and questions.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"67 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143547072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake News Detection Model with Hybrid Features—News Text, Image, and Social Context 具有混合特征的假新闻检测模型——新闻文本、图像和社会语境
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-03 DOI: 10.1007/s10796-025-10589-z
Szu-Yin Lin, Ya-Han Hu, Pei-Ju Lee, Yi-Hua Zeng, Chi-Min Chang, Hsiao-Chuan Chang

With the evolving realm of news propagation and the surge in social media usage, detecting and combatting fake news has become an increasingly important issue. Currently, fake news detection employs three main feature categories: news text, social context, and news images. However, most studies emphasize just one, while only a limited number incorporate image features. This study presents an innovative hybrid fake news detection model amalgamating text mining technology to extract news text features, user information on Twitter to extract social context features, and VGG19 model to extract news image features to increase the model's accuracy. We harness four diverse machine learning algorithms (Logistic Regression, Random Forest, Support Vector Machine, and Extreme Gradient Boosting) to construct models and evaluate their performance via Precision, Recall, F1-Score, and Accuracy metrics. Results indicate the fusion of news text, social context, and image features outperforms their individual application, yielding a noteworthy 92.5% overall accuracy. Significantly, social context attributes, encompassing users, publishers, and distribution networks, contribute crucial insights into detecting early-stage fake news dissemination. Consequently, our study bolsters fact-checking entities by furnishing them with news-content insights for verification and equips social media platforms with a potent fake news detection model—comprising news content, imagery, and user-centric social context data—to discern erroneous information.

随着新闻传播领域的不断发展和社交媒体使用的激增,发现和打击假新闻已经成为一个越来越重要的问题。目前,假新闻检测主要采用三种特征类别:新闻文本、社会语境和新闻图像。然而,大多数研究只强调一种,而只有少数研究结合了图像特征。本研究提出了一种创新的混合假新闻检测模型,该模型融合了文本挖掘技术提取新闻文本特征,Twitter用户信息提取社会语境特征,VGG19模型提取新闻图像特征,以提高模型的准确性。我们利用四种不同的机器学习算法(逻辑回归、随机森林、支持向量机和极端梯度增强)来构建模型,并通过精度、召回率、F1-Score和准确性指标来评估它们的性能。结果表明,新闻文本、社会背景和图像特征的融合优于它们单独的应用,产生了值得注意的92.5%的总体准确率。值得注意的是,包括用户、出版商和分发网络在内的社会背景属性,为检测早期假新闻传播提供了至关重要的见解。因此,我们的研究通过为事实核查实体提供新闻内容见解以进行验证,并为社交媒体平台提供强大的假新闻检测模型(包括新闻内容,图像和以用户为中心的社会背景数据)来识别错误信息,从而支持事实核查实体。
{"title":"Fake News Detection Model with Hybrid Features—News Text, Image, and Social Context","authors":"Szu-Yin Lin, Ya-Han Hu, Pei-Ju Lee, Yi-Hua Zeng, Chi-Min Chang, Hsiao-Chuan Chang","doi":"10.1007/s10796-025-10589-z","DOIUrl":"https://doi.org/10.1007/s10796-025-10589-z","url":null,"abstract":"<p>With the evolving realm of news propagation and the surge in social media usage, detecting and combatting fake news has become an increasingly important issue. Currently, fake news detection employs three main feature categories: news text, social context, and news images. However, most studies emphasize just one, while only a limited number incorporate image features. This study presents an innovative hybrid fake news detection model amalgamating text mining technology to extract news text features, user information on Twitter to extract social context features, and VGG19 model to extract news image features to increase the model's accuracy. We harness four diverse machine learning algorithms (Logistic Regression, Random Forest, Support Vector Machine, and Extreme Gradient Boosting) to construct models and evaluate their performance via Precision, Recall, F1-Score, and Accuracy metrics. Results indicate the fusion of news text, social context, and image features outperforms their individual application, yielding a noteworthy 92.5% overall accuracy. Significantly, social context attributes, encompassing users, publishers, and distribution networks, contribute crucial insights into detecting early-stage fake news dissemination. Consequently, our study bolsters fact-checking entities by furnishing them with news-content insights for verification and equips social media platforms with a potent fake news detection model—comprising news content, imagery, and user-centric social context data—to discern erroneous information.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"67 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143538811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparison of ‘Organizing Forces’ on Reddit and YouTube Networks: Insights From the France Riots of 2023 Reddit和YouTube网络上“组织力量”的比较:来自2023年法国骚乱的见解
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-01 DOI: 10.1007/s10796-025-10587-1
Pramukh Nanjundaswamy Vasist, Satish Krishnan, Nasreen Azad, Nandakumar Mekoth

Social networks are highly effective in mobilizing individuals toward collective action. However, such endeavors to rally large groups risk escalating into violent actions, eroding social unity and provoking societal unrest. The information consumption patterns vary considerably across different platforms through which it is disseminated, with platform-specific characteristics significantly impacting how users interact and disseminate information. Nevertheless, this distinctive characteristic has received minimal attention in the literature. Considering these differences, we seek to understand the mechanisms underlying information dissemination on social networks in the context of mob violence and protests. We conducted a comparative analysis of communication on the Reddit and YouTube networks about the riots in France in 2023. By utilizing social network analysis, we clarify the differences in information dissemination across these networks and contribute to information systems literature on social media actions with theoretical and methodological insights into the dissemination of information about riots.

社交网络在动员个人采取集体行动方面非常有效。然而,这种聚集大群体的努力有可能升级为暴力行动,破坏社会团结并引发社会动荡。在传播信息的不同平台上,信息消费模式差异很大,特定于平台的特征显著影响用户交互和传播信息的方式。然而,这一独特的特征在文献中得到的关注很少。考虑到这些差异,我们试图理解在暴民暴力和抗议的背景下,社交网络上信息传播的潜在机制。我们对Reddit和YouTube网络上关于2023年法国骚乱的传播进行了比较分析。通过利用社会网络分析,我们澄清了这些网络之间信息传播的差异,并通过对骚乱信息传播的理论和方法见解,为有关社交媒体行为的信息系统文献做出贡献。
{"title":"A Comparison of ‘Organizing Forces’ on Reddit and YouTube Networks: Insights From the France Riots of 2023","authors":"Pramukh Nanjundaswamy Vasist, Satish Krishnan, Nasreen Azad, Nandakumar Mekoth","doi":"10.1007/s10796-025-10587-1","DOIUrl":"https://doi.org/10.1007/s10796-025-10587-1","url":null,"abstract":"<p>Social networks are highly effective in mobilizing individuals toward collective action. However, such endeavors to rally large groups risk escalating into violent actions, eroding social unity and provoking societal unrest. The information consumption patterns vary considerably across different platforms through which it is disseminated, with platform-specific characteristics significantly impacting how users interact and disseminate information. Nevertheless, this distinctive characteristic has received minimal attention in the literature. Considering these differences, we seek to understand the mechanisms underlying information dissemination on social networks in the context of mob violence and protests. We conducted a comparative analysis of communication on the Reddit and YouTube networks about the riots in France in 2023. By utilizing social network analysis, we clarify the differences in information dissemination across these networks and contribute to information systems literature on social media actions with theoretical and methodological insights into the dissemination of information about riots.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"12 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143526499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative Artificial Intelligence: Evolving Technology, Growing Societal Impact, and Opportunities for Information Systems Research 生成式人工智能:不断发展的技术,日益增长的社会影响,以及信息系统研究的机会
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-25 DOI: 10.1007/s10796-025-10581-7
Veda C. Storey, Wei Thoo Yue, J. Leon Zhao, Roman Lukyanenko

The continuing, explosive developments in generative artificial intelligence (GenAI), built on large language models and related algorithms, has led to much excitement and speculation about the potential impact of this new technology. Claims include artificial intelligence (AI) being poised to revolutionize business and society and dramatically change personal life. However, it is not clear how this technology, with its significantly distinct features from past AI technologies, has transformative potential or how researchers in information systems should react to it. In this paper, we consider the evolving and emerging trends of AI in order to examine its present and predict its future impacts. Many existing papers on GenAI are either too technical for most information systems researchers or lack the depth needed to appreciate the potential impacts of GenAI. We, therefore, attempt to bridge the technical and organizational communities of GenAI from a system-oriented sociotechnical perspective. Specifically, we explore the unique features of GenAI, which are rooted in the continued change from symbolism to connectionism, and the deep systemic and inherent properties of human-AI ecosystems. We retrace the evolution of AI that proceeded the level of adoption, adaption, and use found today, in order to propose future research on various impacts of GenAI in both business and society within the context of information systems research. Our efforts are intended to contribute to the creation of a well-structured research agenda in the information systems community to support innovative strategies and operations enabled by this new wave of AI.

基于大型语言模型和相关算法的生成式人工智能(GenAI)的持续爆炸性发展,引发了人们对这项新技术潜在影响的兴奋和猜测。有人声称,人工智能(AI)将彻底改变商业和社会,并极大地改变个人生活。然而,目前尚不清楚这种与过去人工智能技术显著不同的技术如何具有变革潜力,也不清楚信息系统的研究人员应该如何应对。在本文中,我们考虑了人工智能的发展和新兴趋势,以检查其现状并预测其未来的影响。对于大多数信息系统研究人员来说,许多关于GenAI的现有论文要么过于技术性,要么缺乏理解GenAI潜在影响所需的深度。因此,我们试图从面向系统的社会技术角度来连接GenAI的技术和组织社区。具体来说,我们探讨了GenAI的独特特征,这些特征植根于从象征主义到联结主义的持续变化,以及人类-人工智能生态系统的深层系统和固有属性。我们追溯了人工智能的演变,从今天的采用、适应和使用水平开始,以便在信息系统研究的背景下,对人工智能在商业和社会中的各种影响提出未来的研究建议。我们的努力旨在为信息系统社区建立一个结构良好的研究议程做出贡献,以支持这一新的人工智能浪潮所带来的创新战略和运营。
{"title":"Generative Artificial Intelligence: Evolving Technology, Growing Societal Impact, and Opportunities for Information Systems Research","authors":"Veda C. Storey, Wei Thoo Yue, J. Leon Zhao, Roman Lukyanenko","doi":"10.1007/s10796-025-10581-7","DOIUrl":"https://doi.org/10.1007/s10796-025-10581-7","url":null,"abstract":"<p>The continuing, explosive developments in generative artificial intelligence (GenAI), built on large language models and related algorithms, has led to much excitement and speculation about the potential impact of this new technology. Claims include artificial intelligence (AI) being poised to revolutionize business and society and dramatically change personal life. However, it is not clear how this technology, with its significantly distinct features from past AI technologies, has transformative potential or how researchers in information systems should react to it. In this paper, we consider the evolving and emerging trends of AI in order to examine its present and predict its future impacts. Many existing papers on GenAI are either too technical for most information systems researchers or lack the depth needed to appreciate the potential impacts of GenAI. We, therefore, attempt to bridge the technical and organizational communities of GenAI from a system-oriented sociotechnical perspective. Specifically, we explore the unique features of GenAI, which are rooted in the continued change from symbolism to connectionism, and the deep systemic and inherent properties of human-AI ecosystems. We retrace the evolution of AI that proceeded the level of adoption, adaption, and use found today, in order to propose future research on various impacts of GenAI in both business and society within the context of information systems research. Our efforts are intended to contribute to the creation of a well-structured research agenda in the information systems community to support innovative strategies and operations enabled by this new wave of AI.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"27 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143486027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Trustworthiness in Real Time Single Object Detection 增强实时单目标检测的可信度
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-19 DOI: 10.1007/s10796-025-10584-4
Konstantinos Tarkasis, Konstantinos Kaparis, Andreas C. Georgiou

We propose a method for the dynamic evaluation of the output provided by any Real Time Object Detection Algorithm. This work focuses on single object detection from video streams and the main objective is the enhancement of the process with regard to its so-called trustworthiness based on the spatial consideration of the sequence of video frames that are fed as inputs on a Convolutional Neural Network (CNN). To this end, we propose a method that systematically tests the differences between the consecutive values returned by the employed neural network. The process identifies patterns that flag potential false positive predictions based on classic similarity metrics and evaluates the quality of the CNN results in a methodologically agnostic fashion. An extended computational illustration demonstrates the effectiveness and the potentials of the proposed approach.

我们提出了一种对任何实时目标检测算法提供的输出进行动态评估的方法。这项工作的重点是视频流中的单个对象检测,主要目标是基于卷积神经网络(CNN)输入的视频帧序列的空间考虑来增强其所谓的可信度。为此,我们提出了一种系统地测试神经网络返回的连续值之间差异的方法。该过程识别基于经典相似性指标的潜在误报预测的模式,并以方法上不可知的方式评估CNN结果的质量。一个扩展的计算实例证明了该方法的有效性和潜力。
{"title":"Enhancing Trustworthiness in Real Time Single Object Detection","authors":"Konstantinos Tarkasis, Konstantinos Kaparis, Andreas C. Georgiou","doi":"10.1007/s10796-025-10584-4","DOIUrl":"https://doi.org/10.1007/s10796-025-10584-4","url":null,"abstract":"<p>We propose a method for the dynamic evaluation of the output provided by any Real Time Object Detection Algorithm. This work focuses on single object detection from video streams and the main objective is the enhancement of the process with regard to its so-called trustworthiness based on the spatial consideration of the sequence of video frames that are fed as inputs on a Convolutional Neural Network (CNN). To this end, we propose a method that systematically tests the differences between the consecutive values returned by the employed neural network. The process identifies patterns that flag potential false positive predictions based on classic similarity metrics and evaluates the quality of the CNN results in a methodologically agnostic fashion. An extended computational illustration demonstrates the effectiveness and the potentials of the proposed approach.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"24 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143443470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Being Responsible in Cybersecurity: A Multi-Layered Perspective 网络安全责任:多层次视角
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-19 DOI: 10.1007/s10796-025-10588-0
Niki Panteli, Boineelo R Nthubu, Konstantinos Mersinas

The paper posits that in the increasingly connected digital landscape, there is a growing need to examine the scale and scope of responsible cybersecurity. In an exploratory study that involved qualitative interviews with senior cybersecurity professionals, we identify different layers of responsible cybersecurity that span across techno-centric, human-centric, organizational (intra and inter) and societal centric perspectives. We present these in an onion-shaped framework and show that collectively these diverse perspectives highlight the linked responsibilities of different stakeholders both within and beyond the organization. The study also finds that senior leadership plays a crucial role in fostering responsible cybersecurity across the different layers. Implications for research and practice are discussed. 

本文认为,在联系日益紧密的数字环境中,越来越需要检查负责任的网络安全的规模和范围。在一项涉及对高级网络安全专业人员进行定性访谈的探索性研究中,我们确定了负责任的网络安全的不同层面,这些层面跨越了以技术为中心、以人为中心、组织(内部和内部)和社会为中心的视角。我们在一个洋葱形的框架中呈现这些观点,并表明这些不同的观点共同强调了组织内外不同利益相关者的相互关联的责任。该研究还发现,高层领导在促进不同层面负责任的网络安全方面发挥着至关重要的作用。讨论了对研究和实践的启示。
{"title":"Being Responsible in Cybersecurity: A Multi-Layered Perspective","authors":"Niki Panteli, Boineelo R Nthubu, Konstantinos Mersinas","doi":"10.1007/s10796-025-10588-0","DOIUrl":"https://doi.org/10.1007/s10796-025-10588-0","url":null,"abstract":"<p>The paper posits that in the increasingly connected digital landscape, there is a growing need to examine the scale and scope of responsible cybersecurity. In an exploratory study that involved qualitative interviews with senior cybersecurity professionals, we identify different layers of responsible cybersecurity that span across techno-centric, human-centric, organizational (intra and inter) and societal centric perspectives. We present these in an onion-shaped framework and show that collectively these diverse perspectives highlight the linked responsibilities of different stakeholders both within and beyond the organization. The study also finds that senior leadership plays a crucial role in fostering responsible cybersecurity across the different layers. Implications for research and practice are discussed. </p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"50 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143443469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information Systems Frontiers
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1