首页 > 最新文献

MIS Q.最新文献

英文 中文
Social Capital Accumulation through Social Media Networks: Evidence from a Randomized Field Experiment and Individual-Level Panel Data 通过社交媒体网络积累社会资本:来自随机场实验和个人水平面板数据的证据
Pub Date : 2022-05-24 DOI: 10.25300/misq/2022/16451
Michael Weiler, Simon Stolz, Andreas Lanz, Christian Schlereth, O. Hinz
Work-related social media networks (SMNs) like LinkedIn introduce novel networking opportunities and features that promise to help individuals establish, extend, and maintain social capital (SC). Typically, work-related SMNs offer access to advanced networking features exclusively to premium users in order to encourage basic users to become paying members. Yet little is known about whether access to these advanced networking features has a causal impact on the accumulation of SC. To close this research gap, we conducted a randomized field experiment and recruited 215 freelancers in a freemium, work-related SMN. Of these recruited participants, more than 70 received a randomly assigned voucher for a free 12- month premium membership. We observe that individuals do not necessarily accumulate more SC from their ability to access advanced networking features, as the treated freelancers did not automatically change their online networking engagement. Those features only reveal their full utility if individuals are motivated to proactively engage in networking. We found that freelancers who had access to advanced networking features increased their SC by 4.609% for each unit increase on the strategic networking behavior scale. We confirmed this finding in another study utilizing a second, individual-level panel dataset covering 52,392 freelancers. We also investigated the dynamics that active vs. passive features play in SC accumulation. Based on these findings, we introduce the “theory of purposeful feature utilization”: essentially, individuals must not only possess an efficacious “networking weapon”—they also need the intent to “shoot” it.
与工作相关的社交媒体网络(smn),如LinkedIn,引入了新的网络机会和功能,承诺帮助个人建立、扩展和维持社会资本(SC)。通常,与工作相关的短信只向高级用户提供高级网络功能,以鼓励基本用户成为付费会员。然而,对于这些高级网络功能是否会对SC积累产生因果影响,我们知之甚少。为了缩小这一研究差距,我们进行了一项随机现场实验,招募了215名自由职业者参加一个免费的、与工作相关的SMN。在这些被招募的参与者中,超过70人收到了一张随机分配的12个月免费高级会员券。我们观察到,个人并不一定会从他们访问高级网络功能的能力中积累更多的SC,因为接受治疗的自由职业者不会自动改变他们的在线网络参与。只有在个人积极主动地参与社交活动的情况下,这些功能才能充分发挥其效用。我们发现,使用高级网络功能的自由职业者在战略网络行为量表上每增加一个单位,他们的SC增加了4.609%。我们在另一项研究中证实了这一发现,该研究利用了第二个个人层面的面板数据集,涵盖了52,392名自由职业者。我们还研究了主动与被动特征在SC积累中的动态作用。基于这些发现,我们引入了“有目的的特征利用理论”:从本质上讲,个体不仅要拥有有效的“网络武器”——他们还需要“射击”它的意图。
{"title":"Social Capital Accumulation through Social Media Networks: Evidence from a Randomized Field Experiment and Individual-Level Panel Data","authors":"Michael Weiler, Simon Stolz, Andreas Lanz, Christian Schlereth, O. Hinz","doi":"10.25300/misq/2022/16451","DOIUrl":"https://doi.org/10.25300/misq/2022/16451","url":null,"abstract":"Work-related social media networks (SMNs) like LinkedIn introduce novel networking opportunities and features that promise to help individuals establish, extend, and maintain social capital (SC). Typically, work-related SMNs offer access to advanced networking features exclusively to premium users in order to encourage basic users to become paying members. Yet little is known about whether access to these advanced networking features has a causal impact on the accumulation of SC. To close this research gap, we conducted a randomized field experiment and recruited 215 freelancers in a freemium, work-related SMN. Of these recruited participants, more than 70 received a randomly assigned voucher for a free 12- month premium membership. We observe that individuals do not necessarily accumulate more SC from their ability to access advanced networking features, as the treated freelancers did not automatically change their online networking engagement. Those features only reveal their full utility if individuals are motivated to proactively engage in networking. We found that freelancers who had access to advanced networking features increased their SC by 4.609% for each unit increase on the strategic networking behavior scale. We confirmed this finding in another study utilizing a second, individual-level panel dataset covering 52,392 freelancers. We also investigated the dynamics that active vs. passive features play in SC accumulation. Based on these findings, we introduce the “theory of purposeful feature utilization”: essentially, individuals must not only possess an efficacious “networking weapon”—they also need the intent to “shoot” it.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"27 1","pages":"771-812"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79686470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Robust Inference Method for Decision-Making in Networks 网络决策的鲁棒推理方法
Pub Date : 2022-05-23 DOI: 10.25300/misq/2022/15992
Aaron Schecter, O. Nohadani, N. Contractor
Social network data collected from digital sources is increasingly being used to gain insights into human behavior. However, while these observable networks constitute an empirical ground truth, the individuals within the network can perceive the network’s structure differently—and they often act on these perceptions. As such, we argue that there is a distinct gap between the data used to model behaviors in a network, and the data internalized by people when they actually engage in behaviors. We find that statistical analyses of observable network structure do not consistently take these discrepancies into account, and this omission may lead to inaccurate inferences about hypothesized network mechanisms. To remedy this issue, we apply techniques of robust optimization to statistical models for social network analysis. Using robust maximum likelihood, we derive an estimation technique that immunizes inference to errors such as false positives and false negatives, without knowing a priori the source or realized magnitude of the error. We demonstrate the efficacy of our methodology on real social network datasets and simulated data. Our contributions extend beyond the social network context, as perception gaps may exist in many other economic contexts.
从数字来源收集的社交网络数据越来越多地被用于洞察人类行为。然而,虽然这些可观察到的网络构成了经验的基础真理,但网络中的个体可以以不同的方式感知网络的结构,并且他们经常根据这些感知采取行动。因此,我们认为,在网络中用于行为建模的数据与人们实际参与行为时内化的数据之间存在明显的差距。我们发现,对可观察到的网络结构的统计分析并没有始终如一地考虑到这些差异,这种遗漏可能导致对假设的网络机制的不准确推断。为了解决这个问题,我们将鲁棒优化技术应用于社会网络分析的统计模型。利用鲁棒极大似然,我们导出了一种估计技术,该技术可以在不先验地知道错误的来源或实现误差的大小的情况下,免疫错误的推断,如假阳性和假阴性。我们在真实的社交网络数据集和模拟数据上证明了我们的方法的有效性。我们的贡献超越了社会网络环境,因为感知差距可能存在于许多其他经济环境中。
{"title":"A Robust Inference Method for Decision-Making in Networks","authors":"Aaron Schecter, O. Nohadani, N. Contractor","doi":"10.25300/misq/2022/15992","DOIUrl":"https://doi.org/10.25300/misq/2022/15992","url":null,"abstract":"Social network data collected from digital sources is increasingly being used to gain insights into human behavior. However, while these observable networks constitute an empirical ground truth, the individuals within the network can perceive the network’s structure differently—and they often act on these perceptions. As such, we argue that there is a distinct gap between the data used to model behaviors in a network, and the data internalized by people when they actually engage in behaviors. We find that statistical analyses of observable network structure do not consistently take these discrepancies into account, and this omission may lead to inaccurate inferences about hypothesized network mechanisms. To remedy this issue, we apply techniques of robust optimization to statistical models for social network analysis. Using robust maximum likelihood, we derive an estimation technique that immunizes inference to errors such as false positives and false negatives, without knowing a priori the source or realized magnitude of the error. We demonstrate the efficacy of our methodology on real social network datasets and simulated data. Our contributions extend beyond the social network context, as perception gaps may exist in many other economic contexts.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"3 1","pages":"713-738"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75553652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Platform Ecosystem Dynamics: The Roles of Product Scope, Innovation, and Collaborative Network Centrality 数字平台生态系统动力学:产品范围、创新和协作网络中心的作用
Pub Date : 2022-05-23 DOI: 10.25300/misq/2022/15444
He Li, Chen Zhang, William J. Kettinger
This research highlights the circulative nature of digital platform ecosystem dynamics. Investigating these dynamics, we examine the mutual influence between participants’ product scope and product innovation over time and probe the moderating role of co-created collaborative networks. We distinguish between two types of product innovation: new product development and existing product updates. Our longitudinal analysis of the Hadoop software ecosystem indicates that participants covering a broader scope of the platform’s technological layers are less likely to develop new products but more likely to update existing products. In turn, participants with more frequent new product development are more likely to expand their product scope, whereas those with more frequent existing product updates are less likely to pursue scope expansion. Participants’ centrality in the ecosystem’s collaborative network amplifies the bidirectional link between product scope and existing product updates but weakens the link between product scope and new product development. Our findings offer a theoretical and practical understanding of temporal dynamics between participants’ product scope choices and different forms of product innovations in the co-created collaborative network environment.
本研究强调了数字平台生态系统动态的循环本质。研究这些动态,我们考察了参与者的产品范围和产品创新之间的相互影响,并探讨了共同创建的协作网络的调节作用。我们将产品创新分为两种类型:新产品开发和现有产品更新。我们对Hadoop软件生态系统的纵向分析表明,覆盖更广泛平台技术层的参与者不太可能开发新产品,但更有可能更新现有产品。反过来,新产品开发更频繁的参与者更有可能扩大他们的产品范围,而那些现有产品更新更频繁的参与者不太可能追求范围扩展。参与者在生态系统协作网络中的中心地位放大了产品范围与现有产品更新之间的双向联系,但削弱了产品范围与新产品开发之间的联系。我们的研究结果为共同创造的协作网络环境中参与者的产品范围选择与不同形式的产品创新之间的时间动态关系提供了理论和实践的理解。
{"title":"Digital Platform Ecosystem Dynamics: The Roles of Product Scope, Innovation, and Collaborative Network Centrality","authors":"He Li, Chen Zhang, William J. Kettinger","doi":"10.25300/misq/2022/15444","DOIUrl":"https://doi.org/10.25300/misq/2022/15444","url":null,"abstract":"This research highlights the circulative nature of digital platform ecosystem dynamics. Investigating these dynamics, we examine the mutual influence between participants’ product scope and product innovation over time and probe the moderating role of co-created collaborative networks. We distinguish between two types of product innovation: new product development and existing product updates. Our longitudinal analysis of the Hadoop software ecosystem indicates that participants covering a broader scope of the platform’s technological layers are less likely to develop new products but more likely to update existing products. In turn, participants with more frequent new product development are more likely to expand their product scope, whereas those with more frequent existing product updates are less likely to pursue scope expansion. Participants’ centrality in the ecosystem’s collaborative network amplifies the bidirectional link between product scope and existing product updates but weakens the link between product scope and new product development. Our findings offer a theoretical and practical understanding of temporal dynamics between participants’ product scope choices and different forms of product innovations in the co-created collaborative network environment.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"7 1","pages":"739-770"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84987726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
How Information Contributed After an Idea Shapes New High-Quality Ideas in Online Ideation Contests 在网上创意竞赛中,一个创意如何形成高质量的新创意
Pub Date : 2022-05-19 DOI: 10.25300/misq/2022/15706
Aron Lindberg, A. Majchrzak, A. Malhotra
Findings on how prior high-quality ideas affect the quality of subsequent ideas in online ideation contests have been mixed. Some studies find that high-quality ideas lead to subsequent high-quality ideas, while others find the opposite. Based on computationally intensive exploratory research, utilizing theory on blending of mental spaces, we suggest that the effects of prior ideas on the generation of subsequent ideas depend on the alignment of (1) crowd participants’ subjective quality assessments of prior ideas and (2) subsequent problemrelated contributions made by the crowd. When a prior idea is assessed as high-quality, this motivates the crowd to emulate that idea. When this motivation is aligned with subsequent contributions that expand the mental space of the prior idea, a new high-quality idea can be created. In contrast, when a prior idea is assessed as low-quality, it motivates the crowd to redirect away from that idea. When this motivation is aligned with subsequent contributions that shift the mental space of the prior idea, a new high-quality idea can be created. The mixed findings in the literature can then be explained by a failure to consider non-idea information contributions made by the crowd.
关于先前的高质量想法如何影响在线创意竞赛中后续想法的质量,研究结果参差不齐。一些研究发现,高质量的想法会带来后续的高质量想法,而另一些研究则发现相反。基于计算密集型的探索性研究,利用心理空间混合理论,我们认为先验思想对后续思想产生的影响取决于(1)群体参与者对先验思想的主观质量评估和(2)群体对后续问题的贡献。当一个先前的想法被评估为高质量时,这就激励了大众去模仿这个想法。当这种动机与随后的贡献相结合,扩展了先前想法的心理空间,就可以创造出一个新的高质量的想法。相反,当一个先前的想法被评估为低质量时,它会促使人们从这个想法中转移。当这种动机与随后的贡献相结合,转移了先前想法的心理空间,就可以创造出一个新的高质量的想法。文献中混杂的发现可以解释为没有考虑到人群对非创意信息的贡献。
{"title":"How Information Contributed After an Idea Shapes New High-Quality Ideas in Online Ideation Contests","authors":"Aron Lindberg, A. Majchrzak, A. Malhotra","doi":"10.25300/misq/2022/15706","DOIUrl":"https://doi.org/10.25300/misq/2022/15706","url":null,"abstract":"Findings on how prior high-quality ideas affect the quality of subsequent ideas in online ideation contests have been mixed. Some studies find that high-quality ideas lead to subsequent high-quality ideas, while others find the opposite. Based on computationally intensive exploratory research, utilizing theory on blending of mental spaces, we suggest that the effects of prior ideas on the generation of subsequent ideas depend on the alignment of (1) crowd participants’ subjective quality assessments of prior ideas and (2) subsequent problemrelated contributions made by the crowd. When a prior idea is assessed as high-quality, this motivates the crowd to emulate that idea. When this motivation is aligned with subsequent contributions that expand the mental space of the prior idea, a new high-quality idea can be created. In contrast, when a prior idea is assessed as low-quality, it motivates the crowd to redirect away from that idea. When this motivation is aligned with subsequent contributions that shift the mental space of the prior idea, a new high-quality idea can be created. The mixed findings in the literature can then be explained by a failure to consider non-idea information contributions made by the crowd.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"1 1","pages":"1195-1208"},"PeriodicalIF":0.0,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78230173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning 基于对抗性深度表征学习的国际暗网跨语言网络安全分析
Pub Date : 2022-05-19 DOI: 10.25300/misq/2022/16618
Mohammadreza Ebrahimi, Yidong Chai, S. Samtani, Hsinchun Chen
International dark web platforms operating within multiple geopolitical regions and languages host a myriad of hacker assets such as malware, hacking tools, hacking tutorials, and malicious source code. Cybersecurity analytics organizations employ machine learning models trained on human-labeled data to automatically detect these assets and bolster their situational awareness. However, the lack of human-labeled training data is prohibitive when analyzing foreign-language dark web content. In this research note, we adopt the computational design science paradigm to develop a novel IT artifact for cross-lingual hacker asset detection (CLHAD). CLHAD automatically leverages the knowledge learned from English content to detect hacker assets in non-English dark web platforms. CLHAD encompasses a novel Adversarial deep representation learning (ADREL) method, which generates multilingual text representations using generative adversarial networks (GANs). Drawing upon the state of the art in cross-lingual knowledge transfer, ADREL is a novel approach to automatically extract transferable text representations and facilitate the analysis of multilingual content. We evaluate CLHAD on Russian, French, and Italian dark web platforms and demonstrate its practical utility in hacker asset profiling, and conduct a proof-of-concept case study. Our analysis suggests that cybersecurity managers may benefit more from focusing on Russian to identify sophisticated hacking assets. In contrast, financial hacker assets are scattered among several dominant dark web languages. Managerial insights for security managers are discussed at operational and strategic levels.
在多个地缘政治区域和语言中运行的国际暗网平台托管着无数的黑客资产,如恶意软件、黑客工具、黑客教程和恶意源代码。网络安全分析组织使用经过人工标记数据训练的机器学习模型来自动检测这些资产并增强其态势感知。然而,在分析外语暗网内容时,缺乏人工标记的训练数据是令人望而却步的。在本研究报告中,我们采用计算设计科学范式来开发一种用于跨语言黑客资产检测(CLHAD)的新型IT工件。CLHAD自动利用从英语内容中学习到的知识来检测非英语暗网平台中的黑客资产。CLHAD包含一种新的对抗深度表示学习(ADREL)方法,该方法使用生成对抗网络(gan)生成多语言文本表示。基于跨语言知识转移的最新技术,ADREL是一种自动提取可转移文本表示并促进多语言内容分析的新方法。我们在俄罗斯、法国和意大利的暗网平台上评估了CLHAD,并展示了其在黑客资产分析中的实际效用,并进行了概念验证案例研究。我们的分析表明,网络安全管理人员可能会从关注俄罗斯人来识别复杂的黑客资产中获益更多。相比之下,金融黑客的资产分散在几个占主导地位的暗网语言中。在操作和战略层面讨论安全管理人员的管理见解。
{"title":"Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning","authors":"Mohammadreza Ebrahimi, Yidong Chai, S. Samtani, Hsinchun Chen","doi":"10.25300/misq/2022/16618","DOIUrl":"https://doi.org/10.25300/misq/2022/16618","url":null,"abstract":"International dark web platforms operating within multiple geopolitical regions and languages host a myriad of hacker assets such as malware, hacking tools, hacking tutorials, and malicious source code. Cybersecurity analytics organizations employ machine learning models trained on human-labeled data to automatically detect these assets and bolster their situational awareness. However, the lack of human-labeled training data is prohibitive when analyzing foreign-language dark web content. In this research note, we adopt the computational design science paradigm to develop a novel IT artifact for cross-lingual hacker asset detection (CLHAD). CLHAD automatically leverages the knowledge learned from English content to detect hacker assets in non-English dark web platforms. CLHAD encompasses a novel Adversarial deep representation learning (ADREL) method, which generates multilingual text representations using generative adversarial networks (GANs). Drawing upon the state of the art in cross-lingual knowledge transfer, ADREL is a novel approach to automatically extract transferable text representations and facilitate the analysis of multilingual content. We evaluate CLHAD on Russian, French, and Italian dark web platforms and demonstrate its practical utility in hacker asset profiling, and conduct a proof-of-concept case study. Our analysis suggests that cybersecurity managers may benefit more from focusing on Russian to identify sophisticated hacking assets. In contrast, financial hacker assets are scattered among several dominant dark web languages. Managerial insights for security managers are discussed at operational and strategic levels.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"33 30","pages":"1209-1226"},"PeriodicalIF":0.0,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91523245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Role of Social Cues and Trust in Users' Private Information Disclosure 社交线索和信任在用户隐私信息披露中的作用
Pub Date : 2022-05-19 DOI: 10.25300/misq/2022/16288
Lior Zalmanson, Gal Oestreicher-Singer, Yael Ecker
Across different domains, websites are incorporating social media features, rendering themselves interactive and community-oriented. This study suggests that these “friendly” websites may indirectly encourage users to disclose private information. To investigate this possibility, we carried out online experiments utilizing a YouTube-like video-browsing platform. This platform provides a realistic and controlled environment in which to study users’ behaviors and perceptions during their first encounter with a website. We show that the presence of social cues on a website (e.g., an environment in which users “like” or rate website content) indirectly affects users’ likelihood of disclosing private information to that website (such as full name, address, and birthdate) by enhancing users’ “social perceptions” of the website (i.e., their perceptions that the website is a place where they can socialize with others). We further show that the presence of social cues is more likely to enhance users’ social perceptions when users are primed to perceive the website as trustworthy, as opposed to untrustworthy (through the presentation of trust cues such as data protection disclaimers). Moreover, we rule out users’ privacy concerns as an alternative mechanism influencing the relationship between social cues and information disclosure. We ground our observations in goal systems and trust theories. Our insights may be beneficial both for managers and for policy makers who seek to safeguard users’ privacy.
在不同的领域,网站正在整合社交媒体功能,使自己具有互动性和社区导向。这项研究表明,这些“友好”的网站可能会间接鼓励用户披露私人信息。为了调查这种可能性,我们利用类似youtube的视频浏览平台进行了在线实验。这个平台提供了一个真实和可控的环境,在这个环境中,研究用户在第一次接触网站时的行为和感知。我们表明,网站上存在的社会线索(例如,用户“喜欢”或评价网站内容的环境)通过增强用户对网站的“社会感知”(即,他们认为网站是他们可以与他人社交的地方),间接影响用户向该网站披露私人信息(如全名、地址和生日)的可能性。我们进一步表明,当用户被认为网站是值得信赖的,而不是不值得信赖的(通过呈现信任线索,如数据保护免责声明)时,社交线索的存在更有可能增强用户的社会感知。此外,我们排除了用户的隐私问题作为影响社会线索与信息披露关系的另一种机制。我们的观察基于目标系统和信任理论。我们的见解可能对寻求保护用户隐私的管理者和政策制定者都有益。
{"title":"The Role of Social Cues and Trust in Users' Private Information Disclosure","authors":"Lior Zalmanson, Gal Oestreicher-Singer, Yael Ecker","doi":"10.25300/misq/2022/16288","DOIUrl":"https://doi.org/10.25300/misq/2022/16288","url":null,"abstract":"Across different domains, websites are incorporating social media features, rendering themselves interactive and community-oriented. This study suggests that these “friendly” websites may indirectly encourage users to disclose private information. To investigate this possibility, we carried out online experiments utilizing a YouTube-like video-browsing platform. This platform provides a realistic and controlled environment in which to study users’ behaviors and perceptions during their first encounter with a website. We show that the presence of social cues on a website (e.g., an environment in which users “like” or rate website content) indirectly affects users’ likelihood of disclosing private information to that website (such as full name, address, and birthdate) by enhancing users’ “social perceptions” of the website (i.e., their perceptions that the website is a place where they can socialize with others). We further show that the presence of social cues is more likely to enhance users’ social perceptions when users are primed to perceive the website as trustworthy, as opposed to untrustworthy (through the presentation of trust cues such as data protection disclaimers). Moreover, we rule out users’ privacy concerns as an alternative mechanism influencing the relationship between social cues and information disclosure. We ground our observations in goal systems and trust theories. Our insights may be beneficial both for managers and for policy makers who seek to safeguard users’ privacy.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"237 1","pages":"1109-1134"},"PeriodicalIF":0.0,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76633430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Randomized Field Experiment to Explore the Impact of Herding Cues as Catalysts for Adoption 一项探索放牧线索作为收养催化剂影响的随机田野实验
Pub Date : 2022-05-19 DOI: 10.25300/MISQ/2022/16141
Yue Feng, Jennifer L. Claggett, Elena Karahanna, K. Y. Tam
A herding cue is a lean information signal that an individual receives about the aggregate number of others who have engaged in a behavior that may result in herd behavior. Given the ease with which they can be leveraged as implementation interventions or design features on online sites, herding cues hold the promise to provide a means to influence adoption behaviors. Yet, little attention has been devoted in the IS adoption literature to understanding the effects of herding cues. Given that herding cues are just one of several forms of social influence on adoption behaviors and are relatively lean in nature, understanding their viability as an implementation intervention necessitates understanding their effects in the presence of (1) other forms of social influence, which also serve to reduce uncertainty and signal the appropriateness of technology adoption, and (2) an individual’s own beliefs about adopting. In this vein, we conducted a randomized field experiment to examine the use of a herding cue as an implementation intervention to hasten adoption behaviors. The research model was evaluated using survival analysis by combining the data from the field experiment with two waves of surveys, and archival logs of adoption. Our results show that a herding cue (1) directly impacts the time it takes an individual to adopt a technology, (2) amplifies the effects of peer behaviors (another type of informative social influence), but has no impact on the effect of subjective norm (a form of normative social influence), and (3) dampens the effects of an individual’s private beliefs about the usefulness of a technology. Our paper disentangles herding information signals to define a herding cue as distinct from other herd behavior triggers, explores how it may interact with other forms of social influences and private beliefs to influence adoption behaviors, and, on a practical level, provides evidence of how a herding cue can be a tangible intervention to accelerate technology adoption.
羊群线索是一个个体接收到的关于其他人的总数的信息信号,这些人参与了可能导致羊群行为的行为。考虑到它们可以轻松地作为在线网站的实施干预或设计功能加以利用,羊群提示有望提供一种影响采用行为的手段。然而,在IS收养文献中,很少有人关注如何理解羊群暗示的影响。鉴于羊群暗示只是影响采用行为的几种社会影响形式之一,而且本质上相对较弱,理解它们作为实施干预措施的可行性需要理解它们在以下情况下的影响:(1)其他形式的社会影响,这些影响也有助于减少不确定性并表明技术采用的适当性,以及(2)个人对采用的信念。在这种情况下,我们进行了一项随机现场实验,以检验羊群提示作为加速采用行为的实施干预的使用。采用生存分析的方法,将实地试验数据与两波调查数据和采用档案日志相结合,对研究模型进行评价。我们的研究结果表明,羊群提示(1)直接影响个体采用技术所需的时间,(2)放大同伴行为的影响(另一种信息社会影响),但对主观规范的影响(一种规范性社会影响)没有影响,(3)抑制个人对技术有用性的私人信念的影响。我们的论文梳理了羊群信息信号,将羊群线索定义为与其他羊群行为触发器不同的线索,探讨了羊群线索如何与其他形式的社会影响和个人信仰相互作用,从而影响采用行为,并在实践层面上提供了羊群线索如何成为加速技术采用的切实干预措施的证据。
{"title":"A Randomized Field Experiment to Explore the Impact of Herding Cues as Catalysts for Adoption","authors":"Yue Feng, Jennifer L. Claggett, Elena Karahanna, K. Y. Tam","doi":"10.25300/MISQ/2022/16141","DOIUrl":"https://doi.org/10.25300/MISQ/2022/16141","url":null,"abstract":"A herding cue is a lean information signal that an individual receives about the aggregate number of others who have engaged in a behavior that may result in herd behavior. Given the ease with which they can be leveraged as implementation interventions or design features on online sites, herding cues hold the promise to provide a means to influence adoption behaviors. Yet, little attention has been devoted in the IS adoption literature to understanding the effects of herding cues. Given that herding cues are just one of several forms of social influence on adoption behaviors and are relatively lean in nature, understanding their viability as an implementation intervention necessitates understanding their effects in the presence of (1) other forms of social influence, which also serve to reduce uncertainty and signal the appropriateness of technology adoption, and (2) an individual’s own beliefs about adopting. In this vein, we conducted a randomized field experiment to examine the use of a herding cue as an implementation intervention to hasten adoption behaviors. The research model was evaluated using survival analysis by combining the data from the field experiment with two waves of surveys, and archival logs of adoption. Our results show that a herding cue (1) directly impacts the time it takes an individual to adopt a technology, (2) amplifies the effects of peer behaviors (another type of informative social influence), but has no impact on the effect of subjective norm (a form of normative social influence), and (3) dampens the effects of an individual’s private beliefs about the usefulness of a technology. Our paper disentangles herding information signals to define a herding cue as distinct from other herd behavior triggers, explores how it may interact with other forms of social influences and private beliefs to influence adoption behaviors, and, on a practical level, provides evidence of how a herding cue can be a tangible intervention to accelerate technology adoption.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"121 1","pages":"1135-1164"},"PeriodicalIF":0.0,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78552845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluating Information Technology Investments: Insights from Executives' Trades 评估信息技术投资:来自高管行业的见解
Pub Date : 2022-05-19 DOI: 10.25300/misq/2022/16355
Taha Havakhor, Sanjiv Sabherwal, R. Sabherwal, Zachary R. Steelman
Performance impacts of investments in information technologies (ITs) are difficult to evaluate. External investors are further constrained by their lack of visibility into the firm’s intangible, complementary actions and capabilities, creating an information asymmetry between them and the firm’s executives. Building on signaling theory and the research on senior executives’ trades in a firm’s stock, this paper addresses the following question: How are the stock trades by a firm’s senior executives before a major IT investment by the firm associated with the future value to the firm from that IT investment? The results based on data on 2,898 publicly announced IT investments from 926 firms during 2002–2016 suggest that (1) the purchasing of a firm’s stock by its senior executives before a firm’s IT investment is associated with the investment’s longterm effect on firm value; (2) such stock purchases by a firm’s senior executives are associated with a stronger positive (negative) relationship between the IT’s newness and the long-term abnormal returns to firms emphasizing a revenue enhancement (cost reduction) IT strategy; (3) for firms pursuing a hybrid strategy, purchases by CIOs but not purchases by CEOs or the newness of IT are associated with firm value, and (4) purchases made by CIOs provide greater information about the IT investment’s impact on firm value than purchases made by CEOs. We further improve our predictive model’s accuracy from 75% for a model including the fit between IT newness and IT strategy to 80% and 91% when considering purchases by CEOs or CIOs, respectively, and 92% when considering purchases by both executives.
信息技术投资对绩效的影响很难评估。外部投资者由于对公司无形的、互补的行动和能力缺乏可视性而进一步受到限制,从而在他们与公司高管之间造成了信息不对称。基于信号理论和对公司高管股票交易的研究,本文解决了以下问题:在公司进行重大IT投资之前,公司高管的股票交易如何与该IT投资对公司的未来价值相关联?基于2002-2016年间926家公司公开宣布的2,898项IT投资数据的研究结果表明:(1)公司高管在公司IT投资前购买公司股票与投资对公司价值的长期影响相关;(2)企业高管的股票购买与IT新颖性与强调收入增加(降低成本)IT战略的企业的长期异常回报之间存在更强的正(负)关系;(3)对于采用混合战略的企业,首席信息官的采购与企业价值相关,而首席信息官的采购与企业价值相关;(4)与首席信息官的采购相比,首席信息官的采购提供了更多关于IT投资对企业价值影响的信息。我们进一步提高了我们的预测模型的准确性,从包括IT新颖性和IT战略之间契合度的模型的75%,分别提高到考虑ceo或cio购买时的80%和91%,考虑两位高管购买时的92%。
{"title":"Evaluating Information Technology Investments: Insights from Executives' Trades","authors":"Taha Havakhor, Sanjiv Sabherwal, R. Sabherwal, Zachary R. Steelman","doi":"10.25300/misq/2022/16355","DOIUrl":"https://doi.org/10.25300/misq/2022/16355","url":null,"abstract":"Performance impacts of investments in information technologies (ITs) are difficult to evaluate. External investors are further constrained by their lack of visibility into the firm’s intangible, complementary actions and capabilities, creating an information asymmetry between them and the firm’s executives. Building on signaling theory and the research on senior executives’ trades in a firm’s stock, this paper addresses the following question: How are the stock trades by a firm’s senior executives before a major IT investment by the firm associated with the future value to the firm from that IT investment? The results based on data on 2,898 publicly announced IT investments from 926 firms during 2002–2016 suggest that (1) the purchasing of a firm’s stock by its senior executives before a firm’s IT investment is associated with the investment’s longterm effect on firm value; (2) such stock purchases by a firm’s senior executives are associated with a stronger positive (negative) relationship between the IT’s newness and the long-term abnormal returns to firms emphasizing a revenue enhancement (cost reduction) IT strategy; (3) for firms pursuing a hybrid strategy, purchases by CIOs but not purchases by CEOs or the newness of IT are associated with firm value, and (4) purchases made by CIOs provide greater information about the IT investment’s impact on firm value than purchases made by CEOs. We further improve our predictive model’s accuracy from 75% for a model including the fit between IT newness and IT strategy to 80% and 91% when considering purchases by CEOs or CIOs, respectively, and 92% when considering purchases by both executives.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"252 1","pages":"1165-1194"},"PeriodicalIF":0.0,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79585395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formation and Mitigation of Technostress in the Personal Use of IT 个人使用信息技术时技术应力的形成与缓解
Pub Date : 2022-05-18 DOI: 10.25300/misq/2022/14950
Markus Salo, H. Pirkkalainen, C. Chua, Tiina Koskelainen
Understanding information technology (IT) use is vital for the information systems (IS) discipline due to its substantial positive and negative consequences. In recent years, IT use for personal purposes has grown rapidly. Although personal use is voluntary and can often reflect fun, technostress is a common negative consequence of such use. When left unaddressed, technostress can cause serious harm to IT users. However, prior research has not explained how technostress forms over time or how its mitigation takes place in a personal—rather than organizational—environment. To address these research gaps, we conducted a qualitative study with narrative interviews of IT users who had experienced technostress. This study contributes to (1) the technostress literature by unpacking states in which technostress forms and can be mitigated and (2) the IT affordance literature by explaining the role of affordances and their actualizations in technostress as well as introducing the new concept of actualization cost. In terms of practice, our findings help individuals and societies identify the development of technostress, understand the activities required for its mitigation, and recognize mitigation barriers.
了解信息技术(IT)的使用对信息系统(is)学科至关重要,因为它具有实质性的积极和消极影响。近年来,个人用途的资讯科技发展迅速。尽管个人使用是自愿的,而且通常可以反映出乐趣,但技术压力是这种使用的常见负面后果。如果不加以解决,技术压力会对IT用户造成严重伤害。然而,先前的研究并没有解释技术压力是如何随着时间的推移而形成的,也没有解释技术压力是如何在个人(而不是组织)环境中缓解的。为了解决这些研究差距,我们对经历过技术压力的IT用户进行了定性研究。本研究有助于(1)技术压力文献通过揭示技术压力形成和可以缓解的状态;(2)IT供给文献通过解释供给及其实现在技术压力中的作用以及引入实现成本的新概念。在实践方面,我们的研究结果有助于个人和社会识别技术压力的发展,了解缓解技术压力所需的活动,并认识到缓解技术压力的障碍。
{"title":"Formation and Mitigation of Technostress in the Personal Use of IT","authors":"Markus Salo, H. Pirkkalainen, C. Chua, Tiina Koskelainen","doi":"10.25300/misq/2022/14950","DOIUrl":"https://doi.org/10.25300/misq/2022/14950","url":null,"abstract":"Understanding information technology (IT) use is vital for the information systems (IS) discipline due to its substantial positive and negative consequences. In recent years, IT use for personal purposes has grown rapidly. Although personal use is voluntary and can often reflect fun, technostress is a common negative consequence of such use. When left unaddressed, technostress can cause serious harm to IT users. However, prior research has not explained how technostress forms over time or how its mitigation takes place in a personal—rather than organizational—environment. To address these research gaps, we conducted a qualitative study with narrative interviews of IT users who had experienced technostress. This study contributes to (1) the technostress literature by unpacking states in which technostress forms and can be mitigated and (2) the IT affordance literature by explaining the role of affordances and their actualizations in technostress as well as introducing the new concept of actualization cost. In terms of practice, our findings help individuals and societies identify the development of technostress, understand the activities required for its mitigation, and recognize mitigation barriers.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"30 1","pages":"1073-1108"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85667028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
When Constructs Become Obsolete: A Systematic Approach to Evaluating and Updating Constructs for Information Systems Research 当结构过时:评估和更新信息系统研究结构的系统方法
Pub Date : 2022-05-18 DOI: 10.25300/misq/2022/15516
Deborah R. Compeau, John Correia, J. Thatcher
In this paper, we confront a paradox in the IS literature that even though our field focuses on the rapid pace of technological change and the dramatic scale of technology-enabled organizational and societal changes, we sometimes find ourselves studying these changes using—largely without question—constructs that were developed in a vastly different IT, user, and organizational environment. We provide guidelines to help assess whether an existing construct warrants updating and to structure the updating task if it is undertaken. Our three-step process provides for a theoretically grounded and comprehensive method that ensures we balance the need for construct updating against the need to sustain our cumulative tradition. We illustrate our guidelines using computer self-efficacy (CSE) as a case study. We document each of the steps involved in analyzing, reconceptualizing, and testing the revised construct information technology self-efficacy (ITSE). Our analyses show that the new construct better explains both traditional and contemporary constructs with a traditional (postal survey) and contemporary (online panel) sample. We discuss the implications of our work both for research on self-efficacy and more broadly for future updating of other important constructs.
在本文中,我们面对了信息系统文献中的一个悖论,即尽管我们的领域关注的是技术变革的快速步伐和技术驱动的组织和社会变革的巨大规模,但我们有时发现自己在研究这些变化时,使用的结构(很大程度上毫无疑问)是在一个截然不同的IT、用户和组织环境中开发的。我们提供了指导方针,以帮助评估现有结构是否需要更新,并在进行更新任务时组织更新任务。我们的三步流程提供了一种理论基础和全面的方法,确保我们在结构更新的需要和维持累积传统的需要之间取得平衡。我们使用计算机自我效能(CSE)作为案例研究来说明我们的指导方针。我们记录了分析、重新概念化和测试修订后的信息技术自我效能(ITSE)的每个步骤。我们的分析表明,新结构更好地解释了传统(邮政调查)和当代(在线面板)样本的传统和当代结构。我们讨论了我们的工作对自我效能的研究以及更广泛地对其他重要构念的未来更新的影响。
{"title":"When Constructs Become Obsolete: A Systematic Approach to Evaluating and Updating Constructs for Information Systems Research","authors":"Deborah R. Compeau, John Correia, J. Thatcher","doi":"10.25300/misq/2022/15516","DOIUrl":"https://doi.org/10.25300/misq/2022/15516","url":null,"abstract":"In this paper, we confront a paradox in the IS literature that even though our field focuses on the rapid pace of technological change and the dramatic scale of technology-enabled organizational and societal changes, we sometimes find ourselves studying these changes using—largely without question—constructs that were developed in a vastly different IT, user, and organizational environment. We provide guidelines to help assess whether an existing construct warrants updating and to structure the updating task if it is undertaken. Our three-step process provides for a theoretically grounded and comprehensive method that ensures we balance the need for construct updating against the need to sustain our cumulative tradition. We illustrate our guidelines using computer self-efficacy (CSE) as a case study. We document each of the steps involved in analyzing, reconceptualizing, and testing the revised construct information technology self-efficacy (ITSE). Our analyses show that the new construct better explains both traditional and contemporary constructs with a traditional (postal survey) and contemporary (online panel) sample. We discuss the implications of our work both for research on self-efficacy and more broadly for future updating of other important constructs.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"12 1","pages":"679-712"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74916285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
MIS Q.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1