Pub Date : 2020-06-01DOI: 10.25300/MISQ/2020/12342
V. Venkatesh, Tracy Ann Sykes, Xiaojun Zhang
With a view toward improving the success of information and communication technology (ICT) initiatives in less developed countries in general and India in particular, this work seeks to uncover reasons for success and failure of ICT for development (ICT4D) initiatives. We drew on social networks theory in general and social contagion theory in particular, and examined the impact of advice network constructs on ICT kiosk use and the impact of ICT kiosk use on women’s health outcomes (i.e., seeking modern medical care and maternal mortality). A two-level model (i.e., village and individual) was developed to understand how women in rural India were influenced by other women in their advice networks to use ICT kiosks, and the effects of ICT kiosk use on seeking modern medical care and maternal mortality. At the village level, we proposed lead user network effects. At the individual level, we proposed structural network effects of other women in a focal woman’s network on individual outcomes of ICT kiosk use, seeking modern medical care, and maternal mortality. We focused on network position (i.e., centrality) and network tie strength (i.e., strong ties and weak ties) as explanatory variables. Specifically, we argued that strong tie centrality will have an adverse effect on ICT kiosk use, whereas weak tie centrality will have a favorable effect. We also argued ICT kiosk use will have a positive effect on seeking modern medical care and a negative effect on maternal mortality. Finally, we argued that seeking modern medical care will have a negative effect on maternal mortality. Our model was mostly supported in data collected about 6,710 women in 10 intervention group villages in rural India and 8,344 women in the control group villages over a period of approximately 7 years.
{"title":"ICT for Development in Rural India: A Longitudinal Study of Women's Health Outcomes","authors":"V. Venkatesh, Tracy Ann Sykes, Xiaojun Zhang","doi":"10.25300/MISQ/2020/12342","DOIUrl":"https://doi.org/10.25300/MISQ/2020/12342","url":null,"abstract":"With a view toward improving the success of information and communication technology (ICT) initiatives in less developed countries in general and India in particular, this work seeks to uncover reasons for success and failure of ICT for development (ICT4D) initiatives. We drew on social networks theory in general and social contagion theory in particular, and examined the impact of advice network constructs on ICT kiosk use and the impact of ICT kiosk use on women’s health outcomes (i.e., seeking modern medical care and maternal mortality). A two-level model (i.e., village and individual) was developed to understand how women in rural India were influenced by other women in their advice networks to use ICT kiosks, and the effects of ICT kiosk use on seeking modern medical care and maternal mortality. At the village level, we proposed lead user network effects. At the individual level, we proposed structural network effects of other women in a focal woman’s network on individual outcomes of ICT kiosk use, seeking modern medical care, and maternal mortality. We focused on network position (i.e., centrality) and network tie strength (i.e., strong ties and weak ties) as explanatory variables. Specifically, we argued that strong tie centrality will have an adverse effect on ICT kiosk use, whereas weak tie centrality will have a favorable effect. We also argued ICT kiosk use will have a positive effect on seeking modern medical care and a negative effect on maternal mortality. Finally, we argued that seeking modern medical care will have a negative effect on maternal mortality. Our model was mostly supported in data collected about 6,710 women in 10 intervention group villages in rural India and 8,344 women in the control group villages over a period of approximately 7 years.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"03 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86090149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.25300/MISQ/2020/12336
S. Shivendu, David Zeng, V. Gurbaxani
Many IT outsourcing arrangements include the purchase of the client’s IT assets by the vendor. Asset transfer benefits the client who can recapture some value through the sale and may even negotiate a lower price because the vendor may be more efficient in using these assets. On the other hand, asset transfer creates lock-in for the client and limits future contractual options. To study these tradeoffs, we develop a game-theoretic framework wherein asset transfer creates a one-sided switching cost to the client, and vendors have private information both on their intrinsic capabilities, either high or low, and on the level of quality-improving effort they exert. The quality of IT services depends on the vendor’s capability and quality-improving effort. In a two-period model, we show that when quality is verifiable, the client uses asset transfer as a device to design efficient screening contracts, so that a high capability vendor is selected. On the other hand, when quality is non-verifiable, the client mitigates contractual inefficiency by voluntarily locking into a long-term relationship with the vendor and may transfer assets at a lower than efficient level, even to a high-capability vendor. Our results show that asset transfer can play a strategic role in outsourcing relationships, not just an operational one.
{"title":"Optimal Asset Transfer in IT Outsourcing Contracts","authors":"S. Shivendu, David Zeng, V. Gurbaxani","doi":"10.25300/MISQ/2020/12336","DOIUrl":"https://doi.org/10.25300/MISQ/2020/12336","url":null,"abstract":"Many IT outsourcing arrangements include the purchase of the client’s IT assets by the vendor. Asset transfer benefits the client who can recapture some value through the sale and may even negotiate a lower price because the vendor may be more efficient in using these assets. On the other hand, asset transfer creates lock-in for the client and limits future contractual options. To study these tradeoffs, we develop a game-theoretic framework wherein asset transfer creates a one-sided switching cost to the client, and vendors have private information both on their intrinsic capabilities, either high or low, and on the level of quality-improving effort they exert. The quality of IT services depends on the vendor’s capability and quality-improving effort. In a two-period model, we show that when quality is verifiable, the client uses asset transfer as a device to design efficient screening contracts, so that a high capability vendor is selected. On the other hand, when quality is non-verifiable, the client mitigates contractual inefficiency by voluntarily locking into a long-term relationship with the vendor and may transfer assets at a lower than efficient level, even to a high-capability vendor. Our results show that asset transfer can play a strategic role in outsourcing relationships, not just an operational one.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"61 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90762249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.25300/MISQ/2020/15062
Andrew J. Harrison, J. Windeler
People frame their communications to suit their personal agendas, even when they are collaborating. However, most information systems (IS) literature assumes people working together have completely aligned agendas. The assumption of agenda alignment in prior research motivates our examination of how agendas and media capabilities influence communication performance. By relaxing the assumption of complete agenda alignment, we reconceptualize how media capabilities interact with communication processes to influence communication performance. We empirically test our model using a lab study with 712 participants interacting face-to-face or via virtual worlds on tasks with differing degrees of agenda alignment. We used a hierarchical linear modeling approach to test our hypotheses. Our results support the role of media synchronicity for explaining communication performance when agendas are aligned. However, our study shows that relaxing the assumption of agenda alignment changes communication in profound ways. We find that media synchronicity is insufficient for describing how media capabilities influence performance in partially cooperative communication contexts. Our findings reveal the importance of anonymity and communication framing when communicants’ agendas differ.
{"title":"Framing Communication: How Agenda Alignment and Media Capabilities Shape Partially Cooperative Communication","authors":"Andrew J. Harrison, J. Windeler","doi":"10.25300/MISQ/2020/15062","DOIUrl":"https://doi.org/10.25300/MISQ/2020/15062","url":null,"abstract":"People frame their communications to suit their personal agendas, even when they are collaborating. However, most information systems (IS) literature assumes people working together have completely aligned agendas. The assumption of agenda alignment in prior research motivates our examination of how agendas and media capabilities influence communication performance. By relaxing the assumption of complete agenda alignment, we reconceptualize how media capabilities interact with communication processes to influence communication performance. We empirically test our model using a lab study with 712 participants interacting face-to-face or via virtual worlds on tasks with differing degrees of agenda alignment. We used a hierarchical linear modeling approach to test our hypotheses. Our results support the role of media synchronicity for explaining communication performance when agendas are aligned. However, our study shows that relaxing the assumption of agenda alignment changes communication in profound ways. We find that media synchronicity is insufficient for describing how media capabilities influence performance in partially cooperative communication contexts. Our findings reveal the importance of anonymity and communication framing when communicants’ agendas differ.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85274675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.25300/MISQ/2020/14818
Christopher B. Califf, Saonee Sarker, Suprateek Sarker
Today’s healthcare workers, specifically nurses, are experiencing technostress associated with the use of healthcare information technology (HIT). Technostress is often characterized by IS researchers as negative, or as being on the “dark side” of technology. However, a broader reading of the stress literature suggests that technostress may be both positive and negative, and can therefore have a “bright side” in addition to a dark side. The objective of this study is to conceptualize a holistic technostress process that includes positive and negative components of technostress embedded in two subprocesses: the techno-eustress subprocess and the techno-distress subprocess, respectively. The study instantiates this holistic technostress model through a sequential mixed-methods research design in the context of HIT. Phase 1 of the design is a qualitative, interpretive case study involving interviews with 32 nurses. Based on the findings from the case study, the paper builds a research model that operationalizes the concepts embedded in the holistic technostress model and identifies contextually relevant challenge and hindrance technostressors and outcomes. In Phase 2, the research model is empirically validated by analyzing survey data collected from 402 nurses employed in the United States. Results reveal that several challenge and hindrance technostressors are related to positive and negative psychological responses, respectively, and that such responses are related to job satisfaction and attrition, which impact turnover intention. Contributions to theory and practice are also discussed.
{"title":"The Bright and Dark Sides of Technostress: A Mixed-Methods Study Involving Healthcare IT","authors":"Christopher B. Califf, Saonee Sarker, Suprateek Sarker","doi":"10.25300/MISQ/2020/14818","DOIUrl":"https://doi.org/10.25300/MISQ/2020/14818","url":null,"abstract":"Today’s healthcare workers, specifically nurses, are experiencing technostress associated with the use of healthcare information technology (HIT). Technostress is often characterized by IS researchers as negative, or as being on the “dark side” of technology. However, a broader reading of the stress literature suggests that technostress may be both positive and negative, and can therefore have a “bright side” in addition to a dark side. The objective of this study is to conceptualize a holistic technostress process that includes positive and negative components of technostress embedded in two subprocesses: the techno-eustress subprocess and the techno-distress subprocess, respectively. The study instantiates this holistic technostress model through a sequential mixed-methods research design in the context of HIT. Phase 1 of the design is a qualitative, interpretive case study involving interviews with 32 nurses. Based on the findings from the case study, the paper builds a research model that operationalizes the concepts embedded in the holistic technostress model and identifies contextually relevant challenge and hindrance technostressors and outcomes. In Phase 2, the research model is empirically validated by analyzing survey data collected from 402 nurses employed in the United States. Results reveal that several challenge and hindrance technostressors are related to positive and negative psychological responses, respectively, and that such responses are related to job satisfaction and attrition, which impact turnover intention. Contributions to theory and practice are also discussed.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90331425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.25300/MISQ/2020/14418
R. Baskerville, M. D. Myers, Youngjin Yoo
{"title":"Digital First: The Ontological Reversal and New Challenges for Information Systems Research","authors":"R. Baskerville, M. D. Myers, Youngjin Yoo","doi":"10.25300/MISQ/2020/14418","DOIUrl":"https://doi.org/10.25300/MISQ/2020/14418","url":null,"abstract":"","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75400177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.25300/MISQ/2020/14110
M. Chau, Tim M. H. Li, P. Wong, J. Xu, P. Yip, Hsinchun Chen
Many people face problems of emotional distress. Early detection of high-risk individuals is the key to prevent suicidal behavior. There is increasing evidence that the Internet and social media provide clues of people’s emotional distress. In particular, some people leave messages showing emotional distress or even suicide notes on the Internet. Identifying emotionally distressed people and examining their posts on the Internet are important steps for health and social work professionals to provide assistance, but the process is very time-consuming and ineffective if conducted manually using standard search engines. Following the design science approach, we present the design of a system called KAREN, which identifies individuals who blog about their emotional distress in the Chinese language, using a combination of machine learning classification and rule-based classification with rules obtained from experts. A controlled experiment and a user study were conducted to evaluate system performance in searching and analyzing blogs written by people who might be emotionally distressed. The results show that the proposed system achieved better classification performance than the benchmark methods and that professionals perceived the system to be more useful and effective for identifying bloggers with emotional distress than benchmark approaches.
{"title":"Finding People with Emotional Distress in Online Social Media: A Design Combining Machine Learning and Rule-Based Classification","authors":"M. Chau, Tim M. H. Li, P. Wong, J. Xu, P. Yip, Hsinchun Chen","doi":"10.25300/MISQ/2020/14110","DOIUrl":"https://doi.org/10.25300/MISQ/2020/14110","url":null,"abstract":"Many people face problems of emotional distress. Early detection of high-risk individuals is the key to prevent suicidal behavior. There is increasing evidence that the Internet and social media provide clues of people’s emotional distress. In particular, some people leave messages showing emotional distress or even suicide notes on the Internet. Identifying emotionally distressed people and examining their posts on the Internet are important steps for health and social work professionals to provide assistance, but the process is very time-consuming and ineffective if conducted manually using standard search engines. Following the design science approach, we present the design of a system called KAREN, which identifies individuals who blog about their emotional distress in the Chinese language, using a combination of machine learning classification and rule-based classification with rules obtained from experts. A controlled experiment and a user study were conducted to evaluate system performance in searching and analyzing blogs written by people who might be emotionally distressed. The results show that the proposed system achieved better classification performance than the benchmark methods and that professionals perceived the system to be more useful and effective for identifying bloggers with emotional distress than benchmark approaches.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85509111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.25300/MISQ/2020/15630
Xueming Luo, Yuchi Zhang, Fue Zeng, Z. Qu
As the online channel is crucially important, traditional offline retail stores seek to induce their existing consumers to buy online with incentives (i.e., offline-to-online targeting). However, it is debatable whether such targeting is truly effective. While advocates argue that online shopping should complement a firm’s store channel, critics counter that doing so may result in cannibalization. Drawing on the channel interplay literature and considering customers’ travel costs, we examine whether and how inducing online shopping complements or cannibalizes a firm’s offline sales. Using a randomized field experiment on over 11,200 customers of a large department store, we provide causal evidence for both the complementarity and cannibalization effects of online and offline channels. Offline-to-online targeting engenders higher online purchases (as intended) than no targeting. The local average treatment effects models suggest that once induced to buy online, consumers who live near the retailer’s physical store tend to increase their offline spending and total sales by 47% (i.e., complementarity effects for nearby consumers). However, for consumers who live far away from the brick-and-mortar store, inducing them to buy online can backfire by reducing offline and total sales by approximately 5.7% for each additional kilometer of distance (i.e., cannibalization effects for distant consumers). Explorations of these mechanisms suggest that distant consumers who are induced to buy online may fail to return to shop in the offline store and purchase less experiential category products with a smaller basket size than other customers, thus leading to a negative net impact on the total sales. These findings alert managers to the dangers of improper targeting and investment in information technology and the importance of consumer heterogeneity for omnichannel commerce across online and offline channels.
{"title":"Complementarity and Cannibalization of Offline-to-Online Targeting: A Field Experiment on Omnichannel Commerce","authors":"Xueming Luo, Yuchi Zhang, Fue Zeng, Z. Qu","doi":"10.25300/MISQ/2020/15630","DOIUrl":"https://doi.org/10.25300/MISQ/2020/15630","url":null,"abstract":"As the online channel is crucially important, traditional offline retail stores seek to induce their existing consumers to buy online with incentives (i.e., offline-to-online targeting). However, it is debatable whether such targeting is truly effective. While advocates argue that online shopping should complement a firm’s store channel, critics counter that doing so may result in cannibalization. Drawing on the channel interplay literature and considering customers’ travel costs, we examine whether and how inducing online shopping complements or cannibalizes a firm’s offline sales. Using a randomized field experiment on over 11,200 customers of a large department store, we provide causal evidence for both the complementarity and cannibalization effects of online and offline channels. Offline-to-online targeting engenders higher online purchases (as intended) than no targeting. The local average treatment effects models suggest that once induced to buy online, consumers who live near the retailer’s physical store tend to increase their offline spending and total sales by 47% (i.e., complementarity effects for nearby consumers). However, for consumers who live far away from the brick-and-mortar store, inducing them to buy online can backfire by reducing offline and total sales by approximately 5.7% for each additional kilometer of distance (i.e., cannibalization effects for distant consumers). Explorations of these mechanisms suggest that distant consumers who are induced to buy online may fail to return to shop in the offline store and purchase less experiential category products with a smaller basket size than other customers, thus leading to a negative net impact on the total sales. These findings alert managers to the dangers of improper targeting and investment in information technology and the importance of consumer heterogeneity for omnichannel commerce across online and offline channels.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85676256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-10DOI: 10.25300/MISQ/2020/14193
Isam Faik, M. Barrett, E. Oborn
While there has been much work on the relationship between Information Technology (IT) and organizational change, there has been limited research that theorizes the relationship between IT and societal change. This paper draws on institutional theory, in particular institutional logics, to develop a model of IT and societal change, which we argue is critical in an era of large scale digital transformation. Our approach is based on a view of society as an inter-institutional system, reflecting the multiplicity of logics at the societal level. We conceptualize societal change as shifts in the multiplicity of logics, with a focus on changes in the levels of centrality and compatibility. Our model relates these changes to the materiality of technology through the concept of IT affordances. We propose three mechanisms, namely sensegiving, translating, and decoupling, through which IT affordances become elements of societal change. We identify three corresponding carriers through which IT affordances gain scale and stability, namely objects, networks, and platforms. We discuss implications of our theoretical developments for future research on IT and societal change.
{"title":"How Information Technology Matters in Societal Change: An Affordance-Based Institutional Perspective","authors":"Isam Faik, M. Barrett, E. Oborn","doi":"10.25300/MISQ/2020/14193","DOIUrl":"https://doi.org/10.25300/MISQ/2020/14193","url":null,"abstract":"While there has been much work on the relationship between Information Technology (IT) and organizational change, there has been limited research that theorizes the relationship between IT and societal change. This paper draws on institutional theory, in particular institutional logics, to develop a model of IT and societal change, which we argue is critical in an era of large scale digital transformation. Our approach is based on a view of society as an inter-institutional system, reflecting the multiplicity of logics at the societal level. We conceptualize societal change as shifts in the multiplicity of logics, with a focus on changes in the levels of centrality and compatibility. Our model relates these changes to the materiality of technology through the concept of IT affordances. We propose three mechanisms, namely sensegiving, translating, and decoupling, through which IT affordances become elements of societal change. We identify three corresponding carriers through which IT affordances gain scale and stability, namely objects, networks, and platforms. We discuss implications of our theoretical developments for future research on IT and societal change.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91013229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-21DOI: 10.25300/MISQ/2020/12284
Likoebe M. Maruping, Sabine Martook
It is well acknowledged that close collaboration with the customer serves as the lynchpin to ensuring that agile information systems development (ISD) teams produce the right software within mutually agreed targets. In several agile ISD methods, this emphasis on close collaboration is enacted through the role of a designated customer representative (CR). The agile ISD literature has recognized the behaviors in this role to be inherently complementary and contradicting in nature, presenting a challenge to whoever occupies the role and hampering their ability to add value to the project. How do CRs manage these challenges and why do they do so in a particular manner? Unfortunately, there has been little theory to answer these questions. In this research, we explore and theorize about this phenomenon by leveraging role multiplexity as a theoretical lens in making sense of the behavior of CRs in agile ISD. Results suggest that the CR role is multiplex, exhibiting multiple manifestations with different orientations. We develop a theoretical model that articulates the instantiation of these role manifestations and the mechanisms that enable the CR role to remain intact while managing these challenges. The theoretical model highlights the CR role in agile ISD as being dynamic and multioriented.
{"title":"The Multiplex Nature of the Customer Representative Role in Agile Information Systems Development","authors":"Likoebe M. Maruping, Sabine Martook","doi":"10.25300/MISQ/2020/12284","DOIUrl":"https://doi.org/10.25300/MISQ/2020/12284","url":null,"abstract":"It is well acknowledged that close collaboration with the customer serves as the lynchpin to ensuring that agile information systems development (ISD) teams produce the right software within mutually agreed targets. In several agile ISD methods, this emphasis on close collaboration is enacted through the role of a designated customer representative (CR). The agile ISD literature has recognized the behaviors in this role to be inherently complementary and contradicting in nature, presenting a challenge to whoever occupies the role and hampering their ability to add value to the project. How do CRs manage these challenges and why do they do so in a particular manner? Unfortunately, there has been little theory to answer these questions. In this research, we explore and theorize about this phenomenon by leveraging role multiplexity as a theoretical lens in making sense of the behavior of CRs in agile ISD. Results suggest that the CR role is multiplex, exhibiting multiple manifestations with different orientations. We develop a theoretical model that articulates the instantiation of these role manifestations and the mechanisms that enable the CR role to remain intact while managing these challenges. The theoretical model highlights the CR role in agile ISD as being dynamic and multioriented.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81850894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.25300/misq/2020/15101
O. Ben‐Assuli, R. Padman
{"title":"Trajectories of Repeated Readmissions of Chronic Disease Patients: Risk Stratification, Profiling, and Prediction","authors":"O. Ben‐Assuli, R. Padman","doi":"10.25300/misq/2020/15101","DOIUrl":"https://doi.org/10.25300/misq/2020/15101","url":null,"abstract":"","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82302104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}