Pub Date : 2022-05-24DOI: 10.25300/misq/2022/16451
Michael Weiler, Simon Stolz, Andreas Lanz, Christian Schlereth, O. Hinz
Work-related social media networks (SMNs) like LinkedIn introduce novel networking opportunities and features that promise to help individuals establish, extend, and maintain social capital (SC). Typically, work-related SMNs offer access to advanced networking features exclusively to premium users in order to encourage basic users to become paying members. Yet little is known about whether access to these advanced networking features has a causal impact on the accumulation of SC. To close this research gap, we conducted a randomized field experiment and recruited 215 freelancers in a freemium, work-related SMN. Of these recruited participants, more than 70 received a randomly assigned voucher for a free 12- month premium membership. We observe that individuals do not necessarily accumulate more SC from their ability to access advanced networking features, as the treated freelancers did not automatically change their online networking engagement. Those features only reveal their full utility if individuals are motivated to proactively engage in networking. We found that freelancers who had access to advanced networking features increased their SC by 4.609% for each unit increase on the strategic networking behavior scale. We confirmed this finding in another study utilizing a second, individual-level panel dataset covering 52,392 freelancers. We also investigated the dynamics that active vs. passive features play in SC accumulation. Based on these findings, we introduce the “theory of purposeful feature utilization”: essentially, individuals must not only possess an efficacious “networking weapon”—they also need the intent to “shoot” it.
{"title":"Social Capital Accumulation through Social Media Networks: Evidence from a Randomized Field Experiment and Individual-Level Panel Data","authors":"Michael Weiler, Simon Stolz, Andreas Lanz, Christian Schlereth, O. Hinz","doi":"10.25300/misq/2022/16451","DOIUrl":"https://doi.org/10.25300/misq/2022/16451","url":null,"abstract":"Work-related social media networks (SMNs) like LinkedIn introduce novel networking opportunities and features that promise to help individuals establish, extend, and maintain social capital (SC). Typically, work-related SMNs offer access to advanced networking features exclusively to premium users in order to encourage basic users to become paying members. Yet little is known about whether access to these advanced networking features has a causal impact on the accumulation of SC. To close this research gap, we conducted a randomized field experiment and recruited 215 freelancers in a freemium, work-related SMN. Of these recruited participants, more than 70 received a randomly assigned voucher for a free 12- month premium membership. We observe that individuals do not necessarily accumulate more SC from their ability to access advanced networking features, as the treated freelancers did not automatically change their online networking engagement. Those features only reveal their full utility if individuals are motivated to proactively engage in networking. We found that freelancers who had access to advanced networking features increased their SC by 4.609% for each unit increase on the strategic networking behavior scale. We confirmed this finding in another study utilizing a second, individual-level panel dataset covering 52,392 freelancers. We also investigated the dynamics that active vs. passive features play in SC accumulation. Based on these findings, we introduce the “theory of purposeful feature utilization”: essentially, individuals must not only possess an efficacious “networking weapon”—they also need the intent to “shoot” it.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"27 1","pages":"771-812"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79686470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-23DOI: 10.25300/misq/2022/15992
Aaron Schecter, O. Nohadani, N. Contractor
Social network data collected from digital sources is increasingly being used to gain insights into human behavior. However, while these observable networks constitute an empirical ground truth, the individuals within the network can perceive the network’s structure differently—and they often act on these perceptions. As such, we argue that there is a distinct gap between the data used to model behaviors in a network, and the data internalized by people when they actually engage in behaviors. We find that statistical analyses of observable network structure do not consistently take these discrepancies into account, and this omission may lead to inaccurate inferences about hypothesized network mechanisms. To remedy this issue, we apply techniques of robust optimization to statistical models for social network analysis. Using robust maximum likelihood, we derive an estimation technique that immunizes inference to errors such as false positives and false negatives, without knowing a priori the source or realized magnitude of the error. We demonstrate the efficacy of our methodology on real social network datasets and simulated data. Our contributions extend beyond the social network context, as perception gaps may exist in many other economic contexts.
{"title":"A Robust Inference Method for Decision-Making in Networks","authors":"Aaron Schecter, O. Nohadani, N. Contractor","doi":"10.25300/misq/2022/15992","DOIUrl":"https://doi.org/10.25300/misq/2022/15992","url":null,"abstract":"Social network data collected from digital sources is increasingly being used to gain insights into human behavior. However, while these observable networks constitute an empirical ground truth, the individuals within the network can perceive the network’s structure differently—and they often act on these perceptions. As such, we argue that there is a distinct gap between the data used to model behaviors in a network, and the data internalized by people when they actually engage in behaviors. We find that statistical analyses of observable network structure do not consistently take these discrepancies into account, and this omission may lead to inaccurate inferences about hypothesized network mechanisms. To remedy this issue, we apply techniques of robust optimization to statistical models for social network analysis. Using robust maximum likelihood, we derive an estimation technique that immunizes inference to errors such as false positives and false negatives, without knowing a priori the source or realized magnitude of the error. We demonstrate the efficacy of our methodology on real social network datasets and simulated data. Our contributions extend beyond the social network context, as perception gaps may exist in many other economic contexts.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"3 1","pages":"713-738"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75553652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-23DOI: 10.25300/misq/2022/15444
He Li, Chen Zhang, William J. Kettinger
This research highlights the circulative nature of digital platform ecosystem dynamics. Investigating these dynamics, we examine the mutual influence between participants’ product scope and product innovation over time and probe the moderating role of co-created collaborative networks. We distinguish between two types of product innovation: new product development and existing product updates. Our longitudinal analysis of the Hadoop software ecosystem indicates that participants covering a broader scope of the platform’s technological layers are less likely to develop new products but more likely to update existing products. In turn, participants with more frequent new product development are more likely to expand their product scope, whereas those with more frequent existing product updates are less likely to pursue scope expansion. Participants’ centrality in the ecosystem’s collaborative network amplifies the bidirectional link between product scope and existing product updates but weakens the link between product scope and new product development. Our findings offer a theoretical and practical understanding of temporal dynamics between participants’ product scope choices and different forms of product innovations in the co-created collaborative network environment.
{"title":"Digital Platform Ecosystem Dynamics: The Roles of Product Scope, Innovation, and Collaborative Network Centrality","authors":"He Li, Chen Zhang, William J. Kettinger","doi":"10.25300/misq/2022/15444","DOIUrl":"https://doi.org/10.25300/misq/2022/15444","url":null,"abstract":"This research highlights the circulative nature of digital platform ecosystem dynamics. Investigating these dynamics, we examine the mutual influence between participants’ product scope and product innovation over time and probe the moderating role of co-created collaborative networks. We distinguish between two types of product innovation: new product development and existing product updates. Our longitudinal analysis of the Hadoop software ecosystem indicates that participants covering a broader scope of the platform’s technological layers are less likely to develop new products but more likely to update existing products. In turn, participants with more frequent new product development are more likely to expand their product scope, whereas those with more frequent existing product updates are less likely to pursue scope expansion. Participants’ centrality in the ecosystem’s collaborative network amplifies the bidirectional link between product scope and existing product updates but weakens the link between product scope and new product development. Our findings offer a theoretical and practical understanding of temporal dynamics between participants’ product scope choices and different forms of product innovations in the co-created collaborative network environment.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"7 1","pages":"739-770"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84987726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-19DOI: 10.25300/misq/2022/15706
Aron Lindberg, A. Majchrzak, A. Malhotra
Findings on how prior high-quality ideas affect the quality of subsequent ideas in online ideation contests have been mixed. Some studies find that high-quality ideas lead to subsequent high-quality ideas, while others find the opposite. Based on computationally intensive exploratory research, utilizing theory on blending of mental spaces, we suggest that the effects of prior ideas on the generation of subsequent ideas depend on the alignment of (1) crowd participants’ subjective quality assessments of prior ideas and (2) subsequent problemrelated contributions made by the crowd. When a prior idea is assessed as high-quality, this motivates the crowd to emulate that idea. When this motivation is aligned with subsequent contributions that expand the mental space of the prior idea, a new high-quality idea can be created. In contrast, when a prior idea is assessed as low-quality, it motivates the crowd to redirect away from that idea. When this motivation is aligned with subsequent contributions that shift the mental space of the prior idea, a new high-quality idea can be created. The mixed findings in the literature can then be explained by a failure to consider non-idea information contributions made by the crowd.
{"title":"How Information Contributed After an Idea Shapes New High-Quality Ideas in Online Ideation Contests","authors":"Aron Lindberg, A. Majchrzak, A. Malhotra","doi":"10.25300/misq/2022/15706","DOIUrl":"https://doi.org/10.25300/misq/2022/15706","url":null,"abstract":"Findings on how prior high-quality ideas affect the quality of subsequent ideas in online ideation contests have been mixed. Some studies find that high-quality ideas lead to subsequent high-quality ideas, while others find the opposite. Based on computationally intensive exploratory research, utilizing theory on blending of mental spaces, we suggest that the effects of prior ideas on the generation of subsequent ideas depend on the alignment of (1) crowd participants’ subjective quality assessments of prior ideas and (2) subsequent problemrelated contributions made by the crowd. When a prior idea is assessed as high-quality, this motivates the crowd to emulate that idea. When this motivation is aligned with subsequent contributions that expand the mental space of the prior idea, a new high-quality idea can be created. In contrast, when a prior idea is assessed as low-quality, it motivates the crowd to redirect away from that idea. When this motivation is aligned with subsequent contributions that shift the mental space of the prior idea, a new high-quality idea can be created. The mixed findings in the literature can then be explained by a failure to consider non-idea information contributions made by the crowd.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"1 1","pages":"1195-1208"},"PeriodicalIF":0.0,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78230173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-19DOI: 10.25300/misq/2022/16618
Mohammadreza Ebrahimi, Yidong Chai, S. Samtani, Hsinchun Chen
International dark web platforms operating within multiple geopolitical regions and languages host a myriad of hacker assets such as malware, hacking tools, hacking tutorials, and malicious source code. Cybersecurity analytics organizations employ machine learning models trained on human-labeled data to automatically detect these assets and bolster their situational awareness. However, the lack of human-labeled training data is prohibitive when analyzing foreign-language dark web content. In this research note, we adopt the computational design science paradigm to develop a novel IT artifact for cross-lingual hacker asset detection (CLHAD). CLHAD automatically leverages the knowledge learned from English content to detect hacker assets in non-English dark web platforms. CLHAD encompasses a novel Adversarial deep representation learning (ADREL) method, which generates multilingual text representations using generative adversarial networks (GANs). Drawing upon the state of the art in cross-lingual knowledge transfer, ADREL is a novel approach to automatically extract transferable text representations and facilitate the analysis of multilingual content. We evaluate CLHAD on Russian, French, and Italian dark web platforms and demonstrate its practical utility in hacker asset profiling, and conduct a proof-of-concept case study. Our analysis suggests that cybersecurity managers may benefit more from focusing on Russian to identify sophisticated hacking assets. In contrast, financial hacker assets are scattered among several dominant dark web languages. Managerial insights for security managers are discussed at operational and strategic levels.
{"title":"Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning","authors":"Mohammadreza Ebrahimi, Yidong Chai, S. Samtani, Hsinchun Chen","doi":"10.25300/misq/2022/16618","DOIUrl":"https://doi.org/10.25300/misq/2022/16618","url":null,"abstract":"International dark web platforms operating within multiple geopolitical regions and languages host a myriad of hacker assets such as malware, hacking tools, hacking tutorials, and malicious source code. Cybersecurity analytics organizations employ machine learning models trained on human-labeled data to automatically detect these assets and bolster their situational awareness. However, the lack of human-labeled training data is prohibitive when analyzing foreign-language dark web content. In this research note, we adopt the computational design science paradigm to develop a novel IT artifact for cross-lingual hacker asset detection (CLHAD). CLHAD automatically leverages the knowledge learned from English content to detect hacker assets in non-English dark web platforms. CLHAD encompasses a novel Adversarial deep representation learning (ADREL) method, which generates multilingual text representations using generative adversarial networks (GANs). Drawing upon the state of the art in cross-lingual knowledge transfer, ADREL is a novel approach to automatically extract transferable text representations and facilitate the analysis of multilingual content. We evaluate CLHAD on Russian, French, and Italian dark web platforms and demonstrate its practical utility in hacker asset profiling, and conduct a proof-of-concept case study. Our analysis suggests that cybersecurity managers may benefit more from focusing on Russian to identify sophisticated hacking assets. In contrast, financial hacker assets are scattered among several dominant dark web languages. Managerial insights for security managers are discussed at operational and strategic levels.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"33 30","pages":"1209-1226"},"PeriodicalIF":0.0,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91523245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-19DOI: 10.25300/misq/2022/16288
Lior Zalmanson, Gal Oestreicher-Singer, Yael Ecker
Across different domains, websites are incorporating social media features, rendering themselves interactive and community-oriented. This study suggests that these “friendly” websites may indirectly encourage users to disclose private information. To investigate this possibility, we carried out online experiments utilizing a YouTube-like video-browsing platform. This platform provides a realistic and controlled environment in which to study users’ behaviors and perceptions during their first encounter with a website. We show that the presence of social cues on a website (e.g., an environment in which users “like” or rate website content) indirectly affects users’ likelihood of disclosing private information to that website (such as full name, address, and birthdate) by enhancing users’ “social perceptions” of the website (i.e., their perceptions that the website is a place where they can socialize with others). We further show that the presence of social cues is more likely to enhance users’ social perceptions when users are primed to perceive the website as trustworthy, as opposed to untrustworthy (through the presentation of trust cues such as data protection disclaimers). Moreover, we rule out users’ privacy concerns as an alternative mechanism influencing the relationship between social cues and information disclosure. We ground our observations in goal systems and trust theories. Our insights may be beneficial both for managers and for policy makers who seek to safeguard users’ privacy.
{"title":"The Role of Social Cues and Trust in Users' Private Information Disclosure","authors":"Lior Zalmanson, Gal Oestreicher-Singer, Yael Ecker","doi":"10.25300/misq/2022/16288","DOIUrl":"https://doi.org/10.25300/misq/2022/16288","url":null,"abstract":"Across different domains, websites are incorporating social media features, rendering themselves interactive and community-oriented. This study suggests that these “friendly” websites may indirectly encourage users to disclose private information. To investigate this possibility, we carried out online experiments utilizing a YouTube-like video-browsing platform. This platform provides a realistic and controlled environment in which to study users’ behaviors and perceptions during their first encounter with a website. We show that the presence of social cues on a website (e.g., an environment in which users “like” or rate website content) indirectly affects users’ likelihood of disclosing private information to that website (such as full name, address, and birthdate) by enhancing users’ “social perceptions” of the website (i.e., their perceptions that the website is a place where they can socialize with others). We further show that the presence of social cues is more likely to enhance users’ social perceptions when users are primed to perceive the website as trustworthy, as opposed to untrustworthy (through the presentation of trust cues such as data protection disclaimers). Moreover, we rule out users’ privacy concerns as an alternative mechanism influencing the relationship between social cues and information disclosure. We ground our observations in goal systems and trust theories. Our insights may be beneficial both for managers and for policy makers who seek to safeguard users’ privacy.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"237 1","pages":"1109-1134"},"PeriodicalIF":0.0,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76633430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-19DOI: 10.25300/MISQ/2022/16141
Yue Feng, Jennifer L. Claggett, Elena Karahanna, K. Y. Tam
A herding cue is a lean information signal that an individual receives about the aggregate number of others who have engaged in a behavior that may result in herd behavior. Given the ease with which they can be leveraged as implementation interventions or design features on online sites, herding cues hold the promise to provide a means to influence adoption behaviors. Yet, little attention has been devoted in the IS adoption literature to understanding the effects of herding cues. Given that herding cues are just one of several forms of social influence on adoption behaviors and are relatively lean in nature, understanding their viability as an implementation intervention necessitates understanding their effects in the presence of (1) other forms of social influence, which also serve to reduce uncertainty and signal the appropriateness of technology adoption, and (2) an individual’s own beliefs about adopting. In this vein, we conducted a randomized field experiment to examine the use of a herding cue as an implementation intervention to hasten adoption behaviors. The research model was evaluated using survival analysis by combining the data from the field experiment with two waves of surveys, and archival logs of adoption. Our results show that a herding cue (1) directly impacts the time it takes an individual to adopt a technology, (2) amplifies the effects of peer behaviors (another type of informative social influence), but has no impact on the effect of subjective norm (a form of normative social influence), and (3) dampens the effects of an individual’s private beliefs about the usefulness of a technology. Our paper disentangles herding information signals to define a herding cue as distinct from other herd behavior triggers, explores how it may interact with other forms of social influences and private beliefs to influence adoption behaviors, and, on a practical level, provides evidence of how a herding cue can be a tangible intervention to accelerate technology adoption.
{"title":"A Randomized Field Experiment to Explore the Impact of Herding Cues as Catalysts for Adoption","authors":"Yue Feng, Jennifer L. Claggett, Elena Karahanna, K. Y. Tam","doi":"10.25300/MISQ/2022/16141","DOIUrl":"https://doi.org/10.25300/MISQ/2022/16141","url":null,"abstract":"A herding cue is a lean information signal that an individual receives about the aggregate number of others who have engaged in a behavior that may result in herd behavior. Given the ease with which they can be leveraged as implementation interventions or design features on online sites, herding cues hold the promise to provide a means to influence adoption behaviors. Yet, little attention has been devoted in the IS adoption literature to understanding the effects of herding cues. Given that herding cues are just one of several forms of social influence on adoption behaviors and are relatively lean in nature, understanding their viability as an implementation intervention necessitates understanding their effects in the presence of (1) other forms of social influence, which also serve to reduce uncertainty and signal the appropriateness of technology adoption, and (2) an individual’s own beliefs about adopting. In this vein, we conducted a randomized field experiment to examine the use of a herding cue as an implementation intervention to hasten adoption behaviors. The research model was evaluated using survival analysis by combining the data from the field experiment with two waves of surveys, and archival logs of adoption. Our results show that a herding cue (1) directly impacts the time it takes an individual to adopt a technology, (2) amplifies the effects of peer behaviors (another type of informative social influence), but has no impact on the effect of subjective norm (a form of normative social influence), and (3) dampens the effects of an individual’s private beliefs about the usefulness of a technology. Our paper disentangles herding information signals to define a herding cue as distinct from other herd behavior triggers, explores how it may interact with other forms of social influences and private beliefs to influence adoption behaviors, and, on a practical level, provides evidence of how a herding cue can be a tangible intervention to accelerate technology adoption.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"121 1","pages":"1135-1164"},"PeriodicalIF":0.0,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78552845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-19DOI: 10.25300/misq/2022/16355
Taha Havakhor, Sanjiv Sabherwal, R. Sabherwal, Zachary R. Steelman
Performance impacts of investments in information technologies (ITs) are difficult to evaluate. External investors are further constrained by their lack of visibility into the firm’s intangible, complementary actions and capabilities, creating an information asymmetry between them and the firm’s executives. Building on signaling theory and the research on senior executives’ trades in a firm’s stock, this paper addresses the following question: How are the stock trades by a firm’s senior executives before a major IT investment by the firm associated with the future value to the firm from that IT investment? The results based on data on 2,898 publicly announced IT investments from 926 firms during 2002–2016 suggest that (1) the purchasing of a firm’s stock by its senior executives before a firm’s IT investment is associated with the investment’s longterm effect on firm value; (2) such stock purchases by a firm’s senior executives are associated with a stronger positive (negative) relationship between the IT’s newness and the long-term abnormal returns to firms emphasizing a revenue enhancement (cost reduction) IT strategy; (3) for firms pursuing a hybrid strategy, purchases by CIOs but not purchases by CEOs or the newness of IT are associated with firm value, and (4) purchases made by CIOs provide greater information about the IT investment’s impact on firm value than purchases made by CEOs. We further improve our predictive model’s accuracy from 75% for a model including the fit between IT newness and IT strategy to 80% and 91% when considering purchases by CEOs or CIOs, respectively, and 92% when considering purchases by both executives.
{"title":"Evaluating Information Technology Investments: Insights from Executives' Trades","authors":"Taha Havakhor, Sanjiv Sabherwal, R. Sabherwal, Zachary R. Steelman","doi":"10.25300/misq/2022/16355","DOIUrl":"https://doi.org/10.25300/misq/2022/16355","url":null,"abstract":"Performance impacts of investments in information technologies (ITs) are difficult to evaluate. External investors are further constrained by their lack of visibility into the firm’s intangible, complementary actions and capabilities, creating an information asymmetry between them and the firm’s executives. Building on signaling theory and the research on senior executives’ trades in a firm’s stock, this paper addresses the following question: How are the stock trades by a firm’s senior executives before a major IT investment by the firm associated with the future value to the firm from that IT investment? The results based on data on 2,898 publicly announced IT investments from 926 firms during 2002–2016 suggest that (1) the purchasing of a firm’s stock by its senior executives before a firm’s IT investment is associated with the investment’s longterm effect on firm value; (2) such stock purchases by a firm’s senior executives are associated with a stronger positive (negative) relationship between the IT’s newness and the long-term abnormal returns to firms emphasizing a revenue enhancement (cost reduction) IT strategy; (3) for firms pursuing a hybrid strategy, purchases by CIOs but not purchases by CEOs or the newness of IT are associated with firm value, and (4) purchases made by CIOs provide greater information about the IT investment’s impact on firm value than purchases made by CEOs. We further improve our predictive model’s accuracy from 75% for a model including the fit between IT newness and IT strategy to 80% and 91% when considering purchases by CEOs or CIOs, respectively, and 92% when considering purchases by both executives.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"252 1","pages":"1165-1194"},"PeriodicalIF":0.0,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79585395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-18DOI: 10.25300/misq/2022/14950
Markus Salo, H. Pirkkalainen, C. Chua, Tiina Koskelainen
Understanding information technology (IT) use is vital for the information systems (IS) discipline due to its substantial positive and negative consequences. In recent years, IT use for personal purposes has grown rapidly. Although personal use is voluntary and can often reflect fun, technostress is a common negative consequence of such use. When left unaddressed, technostress can cause serious harm to IT users. However, prior research has not explained how technostress forms over time or how its mitigation takes place in a personal—rather than organizational—environment. To address these research gaps, we conducted a qualitative study with narrative interviews of IT users who had experienced technostress. This study contributes to (1) the technostress literature by unpacking states in which technostress forms and can be mitigated and (2) the IT affordance literature by explaining the role of affordances and their actualizations in technostress as well as introducing the new concept of actualization cost. In terms of practice, our findings help individuals and societies identify the development of technostress, understand the activities required for its mitigation, and recognize mitigation barriers.
{"title":"Formation and Mitigation of Technostress in the Personal Use of IT","authors":"Markus Salo, H. Pirkkalainen, C. Chua, Tiina Koskelainen","doi":"10.25300/misq/2022/14950","DOIUrl":"https://doi.org/10.25300/misq/2022/14950","url":null,"abstract":"Understanding information technology (IT) use is vital for the information systems (IS) discipline due to its substantial positive and negative consequences. In recent years, IT use for personal purposes has grown rapidly. Although personal use is voluntary and can often reflect fun, technostress is a common negative consequence of such use. When left unaddressed, technostress can cause serious harm to IT users. However, prior research has not explained how technostress forms over time or how its mitigation takes place in a personal—rather than organizational—environment. To address these research gaps, we conducted a qualitative study with narrative interviews of IT users who had experienced technostress. This study contributes to (1) the technostress literature by unpacking states in which technostress forms and can be mitigated and (2) the IT affordance literature by explaining the role of affordances and their actualizations in technostress as well as introducing the new concept of actualization cost. In terms of practice, our findings help individuals and societies identify the development of technostress, understand the activities required for its mitigation, and recognize mitigation barriers.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"30 1","pages":"1073-1108"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85667028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-18DOI: 10.25300/misq/2022/15516
Deborah R. Compeau, John Correia, J. Thatcher
In this paper, we confront a paradox in the IS literature that even though our field focuses on the rapid pace of technological change and the dramatic scale of technology-enabled organizational and societal changes, we sometimes find ourselves studying these changes using—largely without question—constructs that were developed in a vastly different IT, user, and organizational environment. We provide guidelines to help assess whether an existing construct warrants updating and to structure the updating task if it is undertaken. Our three-step process provides for a theoretically grounded and comprehensive method that ensures we balance the need for construct updating against the need to sustain our cumulative tradition. We illustrate our guidelines using computer self-efficacy (CSE) as a case study. We document each of the steps involved in analyzing, reconceptualizing, and testing the revised construct information technology self-efficacy (ITSE). Our analyses show that the new construct better explains both traditional and contemporary constructs with a traditional (postal survey) and contemporary (online panel) sample. We discuss the implications of our work both for research on self-efficacy and more broadly for future updating of other important constructs.
{"title":"When Constructs Become Obsolete: A Systematic Approach to Evaluating and Updating Constructs for Information Systems Research","authors":"Deborah R. Compeau, John Correia, J. Thatcher","doi":"10.25300/misq/2022/15516","DOIUrl":"https://doi.org/10.25300/misq/2022/15516","url":null,"abstract":"In this paper, we confront a paradox in the IS literature that even though our field focuses on the rapid pace of technological change and the dramatic scale of technology-enabled organizational and societal changes, we sometimes find ourselves studying these changes using—largely without question—constructs that were developed in a vastly different IT, user, and organizational environment. We provide guidelines to help assess whether an existing construct warrants updating and to structure the updating task if it is undertaken. Our three-step process provides for a theoretically grounded and comprehensive method that ensures we balance the need for construct updating against the need to sustain our cumulative tradition. We illustrate our guidelines using computer self-efficacy (CSE) as a case study. We document each of the steps involved in analyzing, reconceptualizing, and testing the revised construct information technology self-efficacy (ITSE). Our analyses show that the new construct better explains both traditional and contemporary constructs with a traditional (postal survey) and contemporary (online panel) sample. We discuss the implications of our work both for research on self-efficacy and more broadly for future updating of other important constructs.","PeriodicalId":18743,"journal":{"name":"MIS Q.","volume":"12 1","pages":"679-712"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74916285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}