首页 > 最新文献

Information Systems Journal最新文献

英文 中文
Trending topics workshop 热门话题研讨会
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-08-08 DOI: 10.1111/isj.12465
Andreas Eckhardt
<p>Reforming and innovating how the <i>Information Systems Journal</i> (ISJ) publishes and promotes research has always been a core value of the journal. Therefore, in 2021, we introduced a new submission format with the ISJ Trending Topics Workshop. After 2 years, we are pleased to announce that the first paper from the ISJ Trending Topics Workshop series will be published in the journal. Adam et al. (2023) was submitted to the first workshop issue in June 2021 and will appear in this issue.</p><p>The ISJ Trending Topics Workshop is an annual paper development workshop (PDW) format held in early to mid-June prior to the European Conference on Information Systems (ECIS). We use a hybrid format for the workshop, allowing authors to participate virtually, ensuring inclusivity, and overcoming geographical barriers for those participants who are unable to travel to ECIS. Due to the COVID-19 pandemic and related travel restrictions, the workshop was held in a virtual format in 2021 and 2022. This year, we were able to organise the workshop in a hybrid format on 13 June 2023, in Kristiansand with 28 on-site and 20 virtual participants.</p><p>The PDW encourages scholarship that focuses on high-impact research on emerging trending topics in the IS field, such as inclusive digital initiatives, IS in social and political protests, the impact of generative AI, the ethical use of data, algorithms, and design, social cyberwarfare and cybersecurity, applications of blockchain technology, the role of IS in climate change, and many more. Prior to the workshop, participants whose papers have been accepted for discussion in the workshop receive two additional papers to read and review for their roundtable. During the workshop, participants meet in small groups or virtual breakout rooms where they receive feedback from ISJ Editorial Board members and provide feedback on other participants' papers. The ISJ SEs and AEs facilitate the discussion so that each participant has equal time to receive comments from others in the roundtable.</p><p>Selection for the ISJ Trending Topics Workshop is competitive. This workshop focuses on trending topics and significant societal issues, packaged in a high-quality, high-impact research paper. To be considered for the workshop, a paper must demonstrate a significant contribution to IS research, with or without data. The following table shows the number of submissions to and the acceptance rate for the workshop. </p><p>Authors of workshop papers are not obligated to submit their work to the ISJ after the workshop, but it is ISJ's goal that those papers that receive feedback during the workshop will be ready for submission and further consideration for publication in ISJ after the workshop. Although the paper from the 1st edition of the ISJ's Trending Topics Workshop is published in this issue, papers from the 2nd and 3rd editions of the workshop are currently under review and will be published in future issues of the ISJ
改革和创新《信息系统学报》的出版方式和促进研究的方式一直是该期刊的核心价值。因此,在2021年,我们引入了一种新的提交格式,即ISJ趋势主题研讨会。两年后,我们很高兴地宣布,ISJ趋势主题研讨会系列的第一篇论文将在该杂志上发表。Adam et al.(2023)已于2021年6月提交至第一期研讨会,并将出现在本期。ISJ趋势主题研讨会是在欧洲信息系统会议(ECIS)之前于6月上旬至中旬举行的年度论文开发研讨会(PDW)。我们为研讨会使用混合形式,允许作者虚拟参与,确保包容性,并为那些无法前往ECIS的参与者克服地理障碍。由于2019冠状病毒病大流行和相关旅行限制,该讲习班于2021年和2022年以虚拟形式举行。今年,我们能够在2023年6月13日在克里斯蒂安桑以混合形式组织研讨会,有28名现场参与者和20名虚拟参与者。PDW鼓励专注于对IS领域新兴趋势主题的高影响力研究的奖学金,例如包容性数字倡议、IS在社会和政治抗议中的作用、生成式AI的影响、数据、算法和设计的道德使用、社会网络战和网络安全、区块链技术的应用、IS在气候变化中的作用等等。在研讨会之前,论文被接受在研讨会上讨论的与会者将收到另外两篇论文,供他们的圆桌会议阅读和审查。在研讨会期间,参与者在小组或虚拟分组讨论室会面,在那里他们从ISJ编辑委员会成员那里获得反馈,并对其他参与者的论文提供反馈。ISJ的SEs和ae促进了讨论,以便每位与会者都有相同的时间听取圆桌会议中其他人的意见。ISJ趋势主题研讨会的选择是有竞争性的。本次研讨会的重点是趋势话题和重大的社会问题,包装在一个高质量,高影响力的研究论文。要考虑参加研讨会,论文必须证明对信息系统研究的重大贡献,无论是否有数据。下表显示了研讨会的提交数量和接受率。研讨会论文的作者没有义务在研讨会结束后将他们的工作提交给ISJ,但ISJ的目标是在研讨会结束后,那些在研讨会期间收到反馈的论文将准备好提交并进一步考虑在ISJ上发表。虽然ISJ趋势主题研讨会第1版的论文发表在本期杂志上,但研讨会第2版和第3版的论文目前正在审查中,并将发表在未来的ISJ杂志上。除了在期刊上发表研讨会论文之外,我们举办这次研讨会还有其他几个原因。ISJ趋势话题研讨会的主要目标是营造一个合作的环境,让年轻学者和知名学者都能获得向顶级is期刊投稿的第一手经验。通过参加本次研讨会,特别是早期职业研究人员将有独特的机会学习如何参与顶级期刊的评审过程,以及如何与编辑委员会成员互动。这一迭代过程增加了第一轮评审后获得积极结果的机会,并为作者提供了关于如何加强研究的宝贵见解和建议。我们也认为研讨会是提交进入常规ISJ审查过程之前的第0.5轮审查。作者从SE和AE获得全面的反馈,使他们能够显著地改进他们的提交。该指南使参与者能够在进入常规期刊提交流程之前完善他们的手稿。此外,ISJ趋势话题研讨会在促进与数字化转型相关的知识传播方面发挥着关键作用。鉴于技术的动态特性及其对社会的深远影响,本次研讨会提供了一个特殊的平台,可以发布和讨论与数字化转型趋势主题相关的及时内容。通过将来自不同地理位置的信息系统研究人员与各种各样的内容和方法聚集在一起,我们为探索信息系统领域不同领域的技术进步的影响营造了一个协作环境。我们非常感谢所有在过去三年中处理投稿的ISJ编辑,他们作为圆桌会议的导师,或者在研讨会期间担任小组成员或主题发言人。以下个人至少参加过一次ISJ趋势主题研讨会。
{"title":"Trending topics workshop","authors":"Andreas Eckhardt","doi":"10.1111/isj.12465","DOIUrl":"10.1111/isj.12465","url":null,"abstract":"&lt;p&gt;Reforming and innovating how the &lt;i&gt;Information Systems Journal&lt;/i&gt; (ISJ) publishes and promotes research has always been a core value of the journal. Therefore, in 2021, we introduced a new submission format with the ISJ Trending Topics Workshop. After 2 years, we are pleased to announce that the first paper from the ISJ Trending Topics Workshop series will be published in the journal. Adam et al. (2023) was submitted to the first workshop issue in June 2021 and will appear in this issue.&lt;/p&gt;&lt;p&gt;The ISJ Trending Topics Workshop is an annual paper development workshop (PDW) format held in early to mid-June prior to the European Conference on Information Systems (ECIS). We use a hybrid format for the workshop, allowing authors to participate virtually, ensuring inclusivity, and overcoming geographical barriers for those participants who are unable to travel to ECIS. Due to the COVID-19 pandemic and related travel restrictions, the workshop was held in a virtual format in 2021 and 2022. This year, we were able to organise the workshop in a hybrid format on 13 June 2023, in Kristiansand with 28 on-site and 20 virtual participants.&lt;/p&gt;&lt;p&gt;The PDW encourages scholarship that focuses on high-impact research on emerging trending topics in the IS field, such as inclusive digital initiatives, IS in social and political protests, the impact of generative AI, the ethical use of data, algorithms, and design, social cyberwarfare and cybersecurity, applications of blockchain technology, the role of IS in climate change, and many more. Prior to the workshop, participants whose papers have been accepted for discussion in the workshop receive two additional papers to read and review for their roundtable. During the workshop, participants meet in small groups or virtual breakout rooms where they receive feedback from ISJ Editorial Board members and provide feedback on other participants' papers. The ISJ SEs and AEs facilitate the discussion so that each participant has equal time to receive comments from others in the roundtable.&lt;/p&gt;&lt;p&gt;Selection for the ISJ Trending Topics Workshop is competitive. This workshop focuses on trending topics and significant societal issues, packaged in a high-quality, high-impact research paper. To be considered for the workshop, a paper must demonstrate a significant contribution to IS research, with or without data. The following table shows the number of submissions to and the acceptance rate for the workshop.\u0000 &lt;/p&gt;&lt;p&gt;Authors of workshop papers are not obligated to submit their work to the ISJ after the workshop, but it is ISJ's goal that those papers that receive feedback during the workshop will be ready for submission and further consideration for publication in ISJ after the workshop. Although the paper from the 1st edition of the ISJ's Trending Topics Workshop is published in this issue, papers from the 2nd and 3rd editions of the workshop are currently under review and will be published in future issues of the ISJ","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 6","pages":"1423-1425"},"PeriodicalIF":6.4,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12465","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42877589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quirks, neologisms, provocations and the mundane: Titles and interpretations 测验、新词、挑衅和世俗:标题和解释
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-08-06 DOI: 10.1111/isj.12464
Robert M. Davison
<p>As editor, I get to read a lot of titles, the vast majority of which, alas, we do not end up publishing. In this editorial, I would like to reflect briefly on the nature of titles and their effectiveness in conveying a quick message to a potential reader.</p><p>Throughout the course of my career, I cannot ever recall seeing any advice about how to create a title for a research paper. Titles in general are meaningful and give some clues as to the content of the article that follows. Sometimes we see a title that really catches the eye, that inspires, or even that disgusts, depending on our individual taste. Here is an example of a title of a paper that, regrettably, we did not publish: ‘Rat Swarm Pelican Based Deep Learning And Sequence Mining For Web Page Recommendation’. How do you feel about that? The first three words alone may suffice to turn you on or off. Why the authors thought that the article might be suitable for the ISJ is another matter, but the title alone has a certain unique quality that might seduce or repel you. Thus, just as the creation of a title is a subjective process, so too is the interpretation of a title. But there are some aspects of a title that are worth examining a little more carefully. For instance, we can look at length, depth, comprehensibility, suitability and so forth. In the paragraphs below, I offer some recent ISJ titles and my own analysis. My purpose is to alert readers to the potential for value in a title, and to gently suggest that the creation of a title is itself an art that is worth examining and practicing carefully.</p><p>At one extreme, I have seen titles that are almost as long as the abstract. These often tend to mundane description rather than creative quirkiness. The longer titles often have two parts, separated by a dash or colon. It seems that the authors want to cram into the title as many parts of the study as possible, including in some cases a list of all the moderating and mediating variables. This is probably effective both in conveying the substance of a paper to potential readers, and in lengthening one's cv by a line or two. But is it really necessary? Could one devise a more frugal title that is nevertheless attractive to potential readers? The longest I can see at the ISJ in recent years is Kranz et al. (<span>2016</span>) ‘Understanding the influence of absorptive capacity and ambidexterity on the process of business model change: The case of on-premise and cloud computing software’. It is quite comprehensive and certainly provides very clear information to the reader on what to expect in the article. In contrast, the shortest title at the ISJ (excluding editorials) is Clarke's (<span>2016</span>) ‘Big Data, Big Risks’. Not only is this short and pithy, but it is also quite provocative and controversial. It may be disliked by those who are enamoured of big data for instance. It seems to embed the personal stance of the researcher. As a title, I think it is quite attractive and
作为编辑,我读了很多书,其中绝大多数,唉,我们最终都没有出版。在这篇社论中,我想简要地反思标题的性质及其在向潜在读者传达快速信息方面的有效性。在我的整个职业生涯中,我从来没有看到过任何关于如何为研究论文创建标题的建议。一般来说,标题是有意义的,并提供一些线索,以了解文章的内容。有时我们会看到一个真正吸引眼球的标题,激发灵感的,甚至是令人厌恶的,这取决于我们个人的品味。下面是一篇论文的题目,很遗憾,我们没有发表:“基于鼠群鹈鹕的深度学习和序列挖掘的网页推荐”。你对此有何感想?仅前三个字就足以让你兴奋或沮丧。为什么作者认为这篇文章可能适合ISJ是另一回事,但标题本身就有某种独特的品质,可能会吸引你,也可能会让你反感。因此,正如标题的创作是一个主观过程一样,标题的解释也是一个主观过程。但标题的某些方面值得更仔细地研究一下。例如,我们可以考察长度、深度、可理解性、适用性等等。在下面的段落中,我提供了一些最近的ISJ标题和我自己的分析。我的目的是提醒读者注意标题的潜在价值,并委婉地指出,标题的创作本身就是一门值得仔细研究和实践的艺术。在一个极端情况下,我看到的标题几乎和摘要一样长。这些内容往往是平淡无奇的描述,而不是创造性的奇思妙想。较长的标题通常由两部分组成,中间用破折号或冒号隔开。作者似乎想在标题中塞进尽可能多的研究部分,在某些情况下包括所有调节和中介变量的列表。这可能对向潜在读者传达论文的实质内容很有效,也可能对延长一两行简历很有效。但这真的有必要吗?有谁能想出一个更简洁的标题,同时又能吸引潜在读者呢?近年来,我在ISJ上看到的最长的一篇论文是Kranz等人(2016)的《理解吸收能力和二元性对商业模式变革过程的影响:以内部部署和云计算软件为例》。它非常全面,当然为读者提供了非常清晰的信息,让他们了解文章的内容。相比之下,ISJ上最短的标题(不包括社论)是Clarke(2016)的“大数据,大风险”。这篇文章不仅短小精悍,而且颇具煽动性和争议性。例如,那些迷恋大数据的人可能不喜欢它。它似乎嵌入了研究人员的个人立场。作为一个标题,我认为它很有吸引力,它当然传达了文章本身的本质。有时,一个标题有一种古怪的味道,接近于教义,也就是说,它使用了一个短语或单词组合,似乎有些不合适。这可能会引发新的解读。例如,Gerlach等人(2019)“松弛线上的火烈鸟:公司在平衡处理客户信息和隐私的竞争需求方面面临的挑战”。火烈鸟的原因吗?这是一个谜题,只有在结论的最后一句话才得到解答(Gerlach等人,2019年,第567页),作者写道:“由于他们站在‘摇摆的松弛线上’,公司必须像火烈鸟一样,学会保持平衡的姿态而不会摔倒。”将该组织比喻为火烈鸟的说法会流行起来吗?到目前为止,有限的证据表明,这种情况还没有发生:这篇文章是整个威利在线图书馆中唯一一篇在2023年7月28日的接受期刊中出现“火烈鸟”一词的文章
{"title":"Quirks, neologisms, provocations and the mundane: Titles and interpretations","authors":"Robert M. Davison","doi":"10.1111/isj.12464","DOIUrl":"10.1111/isj.12464","url":null,"abstract":"&lt;p&gt;As editor, I get to read a lot of titles, the vast majority of which, alas, we do not end up publishing. In this editorial, I would like to reflect briefly on the nature of titles and their effectiveness in conveying a quick message to a potential reader.&lt;/p&gt;&lt;p&gt;Throughout the course of my career, I cannot ever recall seeing any advice about how to create a title for a research paper. Titles in general are meaningful and give some clues as to the content of the article that follows. Sometimes we see a title that really catches the eye, that inspires, or even that disgusts, depending on our individual taste. Here is an example of a title of a paper that, regrettably, we did not publish: ‘Rat Swarm Pelican Based Deep Learning And Sequence Mining For Web Page Recommendation’. How do you feel about that? The first three words alone may suffice to turn you on or off. Why the authors thought that the article might be suitable for the ISJ is another matter, but the title alone has a certain unique quality that might seduce or repel you. Thus, just as the creation of a title is a subjective process, so too is the interpretation of a title. But there are some aspects of a title that are worth examining a little more carefully. For instance, we can look at length, depth, comprehensibility, suitability and so forth. In the paragraphs below, I offer some recent ISJ titles and my own analysis. My purpose is to alert readers to the potential for value in a title, and to gently suggest that the creation of a title is itself an art that is worth examining and practicing carefully.&lt;/p&gt;&lt;p&gt;At one extreme, I have seen titles that are almost as long as the abstract. These often tend to mundane description rather than creative quirkiness. The longer titles often have two parts, separated by a dash or colon. It seems that the authors want to cram into the title as many parts of the study as possible, including in some cases a list of all the moderating and mediating variables. This is probably effective both in conveying the substance of a paper to potential readers, and in lengthening one's cv by a line or two. But is it really necessary? Could one devise a more frugal title that is nevertheless attractive to potential readers? The longest I can see at the ISJ in recent years is Kranz et al. (&lt;span&gt;2016&lt;/span&gt;) ‘Understanding the influence of absorptive capacity and ambidexterity on the process of business model change: The case of on-premise and cloud computing software’. It is quite comprehensive and certainly provides very clear information to the reader on what to expect in the article. In contrast, the shortest title at the ISJ (excluding editorials) is Clarke's (&lt;span&gt;2016&lt;/span&gt;) ‘Big Data, Big Risks’. Not only is this short and pithy, but it is also quite provocative and controversial. It may be disliked by those who are enamoured of big data for instance. It seems to embed the personal stance of the researcher. As a title, I think it is quite attractive and","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 6","pages":"1275-1278"},"PeriodicalIF":6.4,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12464","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42087224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
‘What a waste of time’: An examination of cybersecurity legitimacy “真是浪费时间”:对网络安全合法性的审查
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-07-19 DOI: 10.1111/isj.12460
W. Alec Cram, John D'Arcy

Managers who oversee cybersecurity policies commonly rely on managerial encouragement (e.g., rewards) and employee characteristics (e.g., attitude) to drive compliant behaviour. However, whereas some cybersecurity initiatives are perceived as reasonable by employees, others are viewed as a ‘waste of time’. This research introduces employee judgements of cybersecurity legitimacy as a new angle for understanding employee compliance with cybersecurity policies over time. Drawing on theory from the organisational legitimacy and cybersecurity literature, we conduct a three-wave survey of 529 employees and find that, for each separate wave, negative legitimacy judgements mediate the relationship between management support and compliance, as well as between cybersecurity inconvenience and compliance. Our results provide support for cybersecurity legitimacy as an important influence on employee compliance with cybersecurity initiatives. This is significant because it highlights to managers the importance of not simply expecting compliant employee behaviour to follow from the introduction of cybersecurity initiatives, but that employees need to be convinced that the initiatives are fair and reasonable. Interestingly, we did not find sufficient support for our expectation that the increased likelihood of a cybersecurity incident will moderate the legitimacy-policy compliance relationship. This result suggests that the legitimacy perceptions of employees are unyielding to differences in the risk characteristics of the cybersecurity incidents facing organisations.

监督网络安全政策的管理人员通常依靠管理鼓励(如奖励)和员工特征(如态度)来驱动合规行为。然而,尽管员工认为一些网络安全举措是合理的,但其他举措则被视为“浪费时间”。本研究引入了员工对网络安全合法性的判断,作为理解员工长期遵守网络安全政策的新角度。根据组织合法性和网络安全文献中的理论,我们对529名员工进行了三波调查,发现对于每一波,消极的合法性判断都调解了管理支持与合规性之间的关系,以及网络安全不便与合规性之间的关系。我们的研究结果为网络安全合法性对员工遵守网络安全倡议的重要影响提供了支持。这一点很重要,因为它向管理人员强调了在引入网络安全举措后,不能简单地期望员工的合规行为,而是需要让员工相信这些举措是公平合理的。有趣的是,我们没有发现足够的证据支持我们的预期,即网络安全事件的可能性增加将缓和合法性与政策遵从性的关系。这一结果表明,员工的合法性观念不屈服于组织所面临的网络安全事件风险特征的差异。
{"title":"‘What a waste of time’: An examination of cybersecurity legitimacy","authors":"W. Alec Cram,&nbsp;John D'Arcy","doi":"10.1111/isj.12460","DOIUrl":"10.1111/isj.12460","url":null,"abstract":"<p>Managers who oversee cybersecurity policies commonly rely on managerial encouragement (e.g., rewards) and employee characteristics (e.g., attitude) to drive compliant behaviour. However, whereas some cybersecurity initiatives are perceived as reasonable by employees, others are viewed as a ‘waste of time’. This research introduces employee judgements of <i>cybersecurity legitimacy</i> as a new angle for understanding employee compliance with cybersecurity policies over time. Drawing on theory from the organisational legitimacy and cybersecurity literature, we conduct a three-wave survey of 529 employees and find that, for each separate wave, negative legitimacy judgements mediate the relationship between management support and compliance, as well as between cybersecurity inconvenience and compliance. Our results provide support for cybersecurity legitimacy as an important influence on employee compliance with cybersecurity initiatives. This is significant because it highlights to managers the importance of not simply expecting compliant employee behaviour to follow from the introduction of cybersecurity initiatives, but that employees need to be convinced that the initiatives are fair and reasonable. Interestingly, we did not find sufficient support for our expectation that the increased likelihood of a cybersecurity incident will moderate the legitimacy-policy compliance relationship. This result suggests that the legitimacy perceptions of employees are unyielding to differences in the risk characteristics of the cybersecurity incidents facing organisations.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 6","pages":"1396-1422"},"PeriodicalIF":6.4,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12460","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47086021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Diversity, Equity and Inclusion in the AIS: Challenges and opportunities of remote conferences AIS的多样性、公平性和包容性:远程会议的挑战和机遇
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-07-19 DOI: 10.1111/isj.12458
Marco Marabelli, Sam Zaza, Silvia Masiero, Jingyao (Lydia) Li, Kathy Chudoba

With this research opinion article, we aim to contribute to the ongoing conversation concerning diversity, equity and inclusion (DEI) within the IS community. Following Windeler et al.'s (2020) research on perceptions of DEI among members of the Association for Information Systems (AIS), we focus on how conferences should be convened in the post-COVID-19 era to maximise inclusivity. What are the benefits, challenges and implications of holding online and hybrid conferences? Informed by feedback from a survey involving IS scholars in the Global South and from a wide array of AIS senior scholars and conference leaders, we identify several challenges and opportunities of online and hybrid conferences (or, more generally, conferences allowing remote access) for the IS community. We weigh these tradeoffs and implications for DEI and provide reflections to generate constructive discussion on the future of AIS conferences.

通过这篇研究观点文章,我们旨在为IS社区内正在进行的关于多样性、公平性和包容性(DEI)的对话做出贡献。根据Windeler等人(2020)关于信息系统协会(AIS)成员对DEI的看法的研究,我们重点关注在新冠肺炎疫情后时代应如何召开会议,以最大限度地提高包容性。举办在线会议和混合会议的好处、挑战和影响是什么?根据一项涉及全球南方信息系统学者的调查以及广泛的信息系统高级学者和会议领导者的反馈,我们确定了信息系统社区在线和混合会议(或者更广泛地说,允许远程访问的会议)的几个挑战和机遇。我们权衡了这些权衡和对DEI的影响,并提供了思考,以就AIS会议的未来进行建设性讨论。
{"title":"Diversity, Equity and Inclusion in the AIS: Challenges and opportunities of remote conferences","authors":"Marco Marabelli,&nbsp;Sam Zaza,&nbsp;Silvia Masiero,&nbsp;Jingyao (Lydia) Li,&nbsp;Kathy Chudoba","doi":"10.1111/isj.12458","DOIUrl":"https://doi.org/10.1111/isj.12458","url":null,"abstract":"<p>With this research opinion article, we aim to contribute to the ongoing conversation concerning diversity, equity and inclusion (DEI) within the IS community. Following Windeler et al.'s (2020) research on perceptions of DEI among members of the Association for Information Systems (AIS), we focus on how conferences should be convened in the post-COVID-19 era to maximise inclusivity. What are the benefits, challenges and implications of holding online and hybrid conferences? Informed by feedback from a survey involving IS scholars in the Global South and from a wide array of AIS senior scholars and conference leaders, we identify several challenges and opportunities of online and hybrid conferences (or, more generally, conferences allowing remote access) for the IS community. We weigh these tradeoffs and implications for DEI and provide reflections to generate constructive discussion on the future of AIS conferences.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 6","pages":"1370-1395"},"PeriodicalIF":6.4,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12458","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50137983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The practitioner perspective 从业者视角
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-07-18 DOI: 10.1111/isj.12461
Robert M. Davison, Marco Marabelli, Yenni Tim, Cynthia Beath
<p>The Information Systems (IS) discipline traces its origins to issues that were of interest to practitioners, but in recent years the practitioner perspective has often been neglected. Nevertheless, there is increasing recognition that the practitioner's perspective is still important and that the research we undertake can (or should) have implications for practitioners. Journals like MIS Quarterly Executive target this segment exclusively. In this, they complement non-IS journals and magazines in the broader business and technology spheres that also have practitioners in mind, including: Harvard Business Review, Sloan Management Review, California Management Review, Communications of the ACM, McKinsey Quarterly, Academy of Management Perspectives, CIO Magazine, etc. Moreover, some of the existing journals that are predominantly focused on publishing theoretical contributions, for example, the journals that make up the Association of Information Systems' College of Senior Scholars list of eleven premier journals,1 have also demonstrated that they are open to practitioner-oriented submissions.</p><p>The Information Systems Journal (ISJ) has for several years championed the publication of what we call Practitioner Papers (PPs). PPs can contribute to knowledge in a number of different ways, but one of our key objectives in promoting PPs is to further the dialogue between academia and practice. As part of this dialogue, PPs should provide deep insights for researchers into the practitioner's experience with IS in a particular context, as well as, of course, prescriptive and actionable recommendations for practice based on well executed research. Insights for practice may include reframing or reimagining specific practitioner problems, offering a thorough exploration of a phenomenon, documenting lessons learned by practitioners, or illustrating good practices and their outcomes. To render these insights actionable, these articles will include action-oriented prescriptions that suggest what practitioners should do differently in practice.</p><p>While practitioners are the primary intended audience of PPs, academic researchers may also benefit, for instance when PPs engage with new phenomena and propose new insights that challenge and extend the existing discourse. Such outcomes can inspire future academic work to re-examine those prior findings, perhaps as part of the researcher's problematisation of the phenomenon (Chatterjee & Davison, <span>2021</span>).</p><p>Although practitioners are commonly thought of as working in or for organisations, we recognise that practitioners can be found in diverse settings and may not necessarily be serving a corporate entity. We can find practitioners in the political spectrum (i.e., lawmakers), non-governmental organisations, charities, villages, and communities. They may be formally employed, working as activists, or simply citizens with an interest in using IS to make the world a better place (Walsham, <spa
信息系统(IS)学科的起源可以追溯到从业者感兴趣的问题,但近年来,从业者的观点经常被忽视。尽管如此,人们越来越认识到从业者的观点仍然很重要,我们所进行的研究可以(或应该)对从业者产生影响。像《管理信息系统季刊》这样的期刊专门针对这一领域。在这方面,它们补充了更广泛的商业和技术领域的非IS期刊和杂志,这些期刊和杂志也考虑到了从业者,包括:《哈佛商业评论》、《斯隆管理评论》、,一些主要专注于发表理论贡献的现有期刊,例如,构成信息系统协会高级学者学院11种主要期刊名单的期刊,1也表明它们对面向从业者的投稿持开放态度。《信息系统杂志》(ISJ)几年来一直倡导出版我们所称的从业者论文(PP)。PPs可以以多种不同的方式为知识做出贡献,但我们推广PPs的关键目标之一是促进学术界和实践界之间的对话。作为对话的一部分,PP应为研究人员提供深入的见解,让他们了解从业者在特定背景下使用IS的经验,当然,还应根据执行良好的研究为实践提供规范性和可操作的建议。实践的见解可能包括重新定义或重新构想特定的从业者问题,对一种现象进行彻底的探索,记录从业者吸取的经验教训,或说明良好实践及其结果。为了使这些见解具有可操作性,这些文章将包括以行动为导向的处方,建议从业者在实践中应该采取不同的做法。虽然从业者是PP的主要受众,但学术研究人员也可能受益,例如,当PP参与新现象并提出挑战和扩展现有话语的新见解时。这些结果可以激励未来的学术工作重新审视这些先前的发现,也许是研究人员对这一现象进行问题化的一部分(Chatterjee&amp;Davison,2021)。尽管从业者通常被认为是在组织中或为组织工作,但我们认识到,从业者可以在不同的环境中找到,不一定是为企业实体服务。我们可以在政治光谱中找到从业者(即立法者)、非政府组织、慈善机构、村庄和社区。他们可能被正式雇佣,作为活动家工作,也可能只是有兴趣利用IS让世界变得更美好的公民(Walsham,2012)。在ISJ上,PP类型的投稿是零星的,质量参差不齐。Tamm等人(2022)和Tim等人(2021)是已发表的PP的例子,而Pan和Pee(2020)为证明研究对实践的影响提供了一个框架。为了进一步鼓励以从业者为导向的研究,我们最近重新制定了PP指南2,并宣布了一期专门关注实践的特刊3。我们的目标是进一步推动以从业者为导向的工作。与常规的研究文章一样,PP可以写在广泛的IS领域内的广泛主题上。像所有顶级期刊一样,我们寻求发表前沿研究,以推进信息系统领域的知识。因此,我们不打算将PP用作教学案例的载体,也不打算将其用作对实践有一定增量贡献的低质量(被拒绝)研究文章的载体。我们对研究当代和新兴问题的PP特别感兴趣,例如区块链、数字期货、生成人工智能、机器人/自动化、模拟/数字双胞胎和可持续信息系统。尽管这些主题领域中的许多都是执业管理者关注的,我们强调,管理者不是唯一的受众,我们欢迎针对非管理层读者的投稿,包括学者、员工和公民。例如,数字技术带来的一些社会问题很难解决,因此我们希望提交能够阐明这些问题的PP,并提供社会中一些群体如何努力解决这些问题的说明性案例研究。我们注意到,PP的根本目的不是推进理论!相反,目的是提供可操作的见解,这些见解将对从业者解决实际问题和应对他们面临的挑战感兴趣。 为了使论文的核心内容简短易懂,PP中使用的方法描述(如果适用)通常会在附录中找到。我们认识到,PP的潜在作者可能会担心他们的论文将如何被审查。首先,我们认为从业者的观点是审查中的一个基本要素,因此每个通过初步筛选并被送去审查的PP都将至少有一名从业者审查员。这将不是一个补充评审员,而是一个我们将像学术评审员一样关注的主要评审员。在选择学术评审员时,我们还将注意他们的专业知识,并将寻求任命自己撰写了以从业者为导向的论文的评审员。我们不会任命反对PP概念的评审员。我们预计PP的格式将与学术期刊上发表的研究文章和从业者文献中发表的咨询报告不同。PP的审查者不应该过分关注格式,而是应该检查作者试图传达的信息。如果论文中使用的语言非常技术性,或者充满了学术术语,从业者或学术受众都可能无法理解,我们希望审稿人发出警告。例如,研究人员可能理解编码器间可靠性或事务记忆等概念,但从业者可能不理解,因此需要调整语言,使其不那么技术化,不那么充满行话。同样,学术受众可能会被从业者常用的一些术语所混淆,尤其是如果这些术语植根于特定的组织环境。我们预计,通过支持从业者的观点,我们将在信息系统领域带来一些长期影响。我们希望重新引发关于我们研究相关性的辩论,并鼓励学术研究人员认真对待实践世界。我们还希望将我们的研究更贴近从业者群体。我们可以从信息系统从业者那里学到很多东西,我们期待他们为这场辩论做出积极贡献。我们希望他们也能通过这种媒介相互学习。是否存在不利因素?象牙塔研究人员可能会对我们进军实践世界感到不满,就像他们不喜欢顾问一样。博士生可能会感到困惑,尤其是如果他们的导师告诉他们,无论是作为作者还是读者,都要避开PP。有些人可能会将这一冒险视为对IS作为一门学术学科神圣性的生存威胁。对于所有这些人,我们建议你评估你之前工作的效用及其影响,而不是对你的职业、h指数和简历,而是对其他利益相关者。事实上,我们保证,你的简历上有个人简历,你的声誉(和h-index)会大大提高。
{"title":"The practitioner perspective","authors":"Robert M. Davison,&nbsp;Marco Marabelli,&nbsp;Yenni Tim,&nbsp;Cynthia Beath","doi":"10.1111/isj.12461","DOIUrl":"https://doi.org/10.1111/isj.12461","url":null,"abstract":"&lt;p&gt;The Information Systems (IS) discipline traces its origins to issues that were of interest to practitioners, but in recent years the practitioner perspective has often been neglected. Nevertheless, there is increasing recognition that the practitioner's perspective is still important and that the research we undertake can (or should) have implications for practitioners. Journals like MIS Quarterly Executive target this segment exclusively. In this, they complement non-IS journals and magazines in the broader business and technology spheres that also have practitioners in mind, including: Harvard Business Review, Sloan Management Review, California Management Review, Communications of the ACM, McKinsey Quarterly, Academy of Management Perspectives, CIO Magazine, etc. Moreover, some of the existing journals that are predominantly focused on publishing theoretical contributions, for example, the journals that make up the Association of Information Systems' College of Senior Scholars list of eleven premier journals,1 have also demonstrated that they are open to practitioner-oriented submissions.&lt;/p&gt;&lt;p&gt;The Information Systems Journal (ISJ) has for several years championed the publication of what we call Practitioner Papers (PPs). PPs can contribute to knowledge in a number of different ways, but one of our key objectives in promoting PPs is to further the dialogue between academia and practice. As part of this dialogue, PPs should provide deep insights for researchers into the practitioner's experience with IS in a particular context, as well as, of course, prescriptive and actionable recommendations for practice based on well executed research. Insights for practice may include reframing or reimagining specific practitioner problems, offering a thorough exploration of a phenomenon, documenting lessons learned by practitioners, or illustrating good practices and their outcomes. To render these insights actionable, these articles will include action-oriented prescriptions that suggest what practitioners should do differently in practice.&lt;/p&gt;&lt;p&gt;While practitioners are the primary intended audience of PPs, academic researchers may also benefit, for instance when PPs engage with new phenomena and propose new insights that challenge and extend the existing discourse. Such outcomes can inspire future academic work to re-examine those prior findings, perhaps as part of the researcher's problematisation of the phenomenon (Chatterjee &amp; Davison, &lt;span&gt;2021&lt;/span&gt;).&lt;/p&gt;&lt;p&gt;Although practitioners are commonly thought of as working in or for organisations, we recognise that practitioners can be found in diverse settings and may not necessarily be serving a corporate entity. We can find practitioners in the political spectrum (i.e., lawmakers), non-governmental organisations, charities, villages, and communities. They may be formally employed, working as activists, or simply citizens with an interest in using IS to make the world a better place (Walsham, &lt;spa","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 6","pages":"1455-1458"},"PeriodicalIF":6.4,"publicationDate":"2023-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12461","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50152055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Gamified monetary reward designs: Offering certain versus chance-based rewards 游戏化货币奖励设计:提供特定奖励与基于机会的奖励
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-07-18 DOI: 10.1111/isj.12459
Martin Adam, Annika Reinelt, Konstantin Roethke

To motivate visitors to engage with websites, e-tailers widely employ monetary rewards (e.g., vouchers, discounts) in their website designs. With advances in user interface technologies, many e-tailers have started to offer gamified monetary reward designs (MRDs), which require visitors to earn the monetary reward by playing a game, rather than simply claiming the reward. However, little is known about whether and why gamified MRDs engage visitors compared to their non-gamified counterpart. Even less is known about the effectiveness of gamified MRDs when providing certain or chance-based rewards, in that visitors do or do not know what reward they will gain for successfully performing in the game. Drawing on cognitive evaluation theory, we investigate gamified MRDs with certain or chance-based rewards and contrast them to non-gamified MRDs with certain rewards in user registration systems. Our results from a multi-method approach encompassing the complementary features of a randomised field experiment (N = 651) and a randomised online experiment (N = 330) demonstrate differential effects of the three investigated MRDs on user registration. Visitors encountering either type of gamified MRD are more likely to register than those encountering a non-gamified MRD. Moreover, gamified MRDs with chance-based rewards have the highest likelihood of user registrations. We also show that MRDs have distinct indirect effects on user registration via anticipated experiences of competence and sensation. Overall, the paper offers theoretical insights and practical guidance on how and why gamified MRDs are effective for e-tailers.

为了激励访问者参与网站,电子裁缝在其网站设计中广泛使用金钱奖励(如代金券、折扣)。随着用户界面技术的进步,许多电子零售商已经开始提供游戏化的金钱奖励设计(MRD),要求访问者通过玩游戏来获得金钱奖励,而不是简单地索要奖励。然而,与非游戏化的MRD相比,游戏化MRD是否以及为什么会吸引游客,目前还知之甚少。对于游戏化MRD在提供特定或基于机会的奖励时的有效性,我们知之甚少,因为访问者知道或不知道他们在游戏中成功表现会获得什么奖励。根据认知评估理论,我们研究了具有特定或基于机会的奖励的游戏化MRD,并将其与用户注册系统中具有特定奖励的非游戏化MRD。我们的结果来自多方法方法,包括随机现场实验的互补特征(N = 651)和一项随机在线实验(N = 330)展示了所研究的三个MRD对用户注册的不同影响。遇到任何一种游戏化MRD的游客都比遇到非游戏化MRD的游客更有可能注册。此外,具有基于机会的奖励的游戏化MRD具有最高的用户注册可能性。我们还表明,MRD通过预期的能力和感觉体验对用户注册具有明显的间接影响。总的来说,该论文为游戏化MRD如何以及为什么对电子零售商有效提供了理论见解和实践指导。
{"title":"Gamified monetary reward designs: Offering certain versus chance-based rewards","authors":"Martin Adam,&nbsp;Annika Reinelt,&nbsp;Konstantin Roethke","doi":"10.1111/isj.12459","DOIUrl":"10.1111/isj.12459","url":null,"abstract":"<p>To motivate visitors to engage with websites, e-tailers widely employ monetary rewards (e.g., vouchers, discounts) in their website designs. With advances in user interface technologies, many e-tailers have started to offer <i>gamified monetary reward designs</i> (MRDs), which require visitors to earn the monetary reward by playing a game, rather than simply claiming the reward. However, little is known about whether and why gamified MRDs engage visitors compared to their non-gamified counterpart. Even less is known about the effectiveness of gamified MRDs when providing <i>certain</i> or <i>chance-based</i> rewards, in that visitors do or do not know what reward they will gain for successfully performing in the game. Drawing on cognitive evaluation theory, we investigate gamified MRDs with certain or chance-based rewards and contrast them to non-gamified MRDs with certain rewards in user registration systems. Our results from a multi-method approach encompassing the complementary features of a randomised field experiment (<i>N</i> = 651) and a randomised online experiment (<i>N</i> = 330) demonstrate differential effects of the three investigated MRDs on user registration. Visitors encountering either type of gamified MRD are more likely to register than those encountering a non-gamified MRD. Moreover, gamified MRDs with chance-based rewards have the highest likelihood of user registrations. We also show that MRDs have distinct indirect effects on user registration via anticipated experiences of competence and sensation. Overall, the paper offers theoretical insights and practical guidance on how and why gamified MRDs are effective for e-tailers.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 6","pages":"1426-1454"},"PeriodicalIF":6.4,"publicationDate":"2023-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12459","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49140873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The digital augmentation of extremism: Reviewing and guiding online extremism research from a sociotechnical perspective 极端主义的数字化增强:从社会技术角度审视和指导网络极端主义研究
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-07-17 DOI: 10.1111/isj.12454
Marten Risius, Kevin M. Blasiak, Susilo Wibisono, Winnifred R. Louis

Online extremism remains a persistent problem despite the best efforts of governments, tech companies and civil society. Digital technologies can induce group polarization to promote extremism and cause substantial changes to extremism (e.g., create new forms of extremism, types of threats or radicalization approaches). Current methods to counter extremism induce undesirable side-effects (e.g., ostracize minorities, inadvertently promote extremism) or do not leverage the full potential of digital technologies. Extremism experts recognize the need for researchers from other disciplines, like information systems, to contribute their technical expertise for understanding and countering online extremism. This article aims to introduce the field of information systems to the issue of online extremism. Information systems scholars address technology-related societal issues from a sociotechnical perspective. The sociotechnical perspective describes systems through a series of interactions between social (structure, people) and technical components (physical system, task). We apply the sociotechnical perspective to (1) summarize the current state-of-the-art knowledge of 222 articles in a systematic multi-disciplinary literature review and (2) propose specific research questions that address two questions (How do digital technologies augment extremism? How can we successfully counter online extremism?).

尽管政府、科技公司和民间社会做出了最大努力,但网络极端主义仍是一个长期存在的问题。数字技术可诱发群体极化,从而助长极端主义,并使极端主义发生实质性变化(如创造新的极端主义形式、威胁类型或激进化方法)。目前打击极端主义的方法会产生不良的副作用(如排斥少数群体、无意中助长极端主义),或无法充分发挥数字技术的潜力。极端主义专家认识到,需要信息系统等其他学科的研究人员为理解和打击网络极端主义贡献自己的技术专长。本文旨在向网络极端主义问题介绍信息系统领域。信息系统学者从社会技术的角度探讨与技术相关的社会问题。社会技术视角通过社会(结构、人)和技术(物理系统、任务)之间的一系列互动来描述系统。我们运用社会技术视角:(1) 通过系统的多学科文献综述,总结了目前关于 222 篇文章的最新知识;(2) 针对两个问题(数字技术如何增强极端主义?我们如何才能成功打击网络极端主义?)
{"title":"The digital augmentation of extremism: Reviewing and guiding online extremism research from a sociotechnical perspective","authors":"Marten Risius,&nbsp;Kevin M. Blasiak,&nbsp;Susilo Wibisono,&nbsp;Winnifred R. Louis","doi":"10.1111/isj.12454","DOIUrl":"10.1111/isj.12454","url":null,"abstract":"<p>Online extremism remains a persistent problem despite the best efforts of governments, tech companies and civil society. Digital technologies can induce group polarization to promote extremism and cause substantial changes to extremism (e.g., create new forms of extremism, types of threats or radicalization approaches). Current methods to counter extremism induce undesirable side-effects (e.g., ostracize minorities, inadvertently promote extremism) or do not leverage the full potential of digital technologies. Extremism experts recognize the need for researchers from other disciplines, like information systems, to contribute their technical expertise for understanding and countering online extremism. This article aims to introduce the field of information systems to the issue of online extremism. Information systems scholars address technology-related societal issues from a sociotechnical perspective. The sociotechnical perspective describes systems through a series of interactions between social (structure, people) and technical components (physical system, task). We apply the sociotechnical perspective to (1) summarize the current state-of-the-art knowledge of 222 articles in a systematic multi-disciplinary literature review and (2) propose specific research questions that address two questions (How do digital technologies augment extremism? How can we successfully counter online extremism?).</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 3","pages":"931-963"},"PeriodicalIF":6.4,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12454","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41800265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design process knowledge for crisis-driven information systems solutions: Insights on building digital resilience from an action design research study 危机驱动的信息系统解决方案的设计过程知识:行动设计研究对建立数字弹性的见解
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-07-17 DOI: 10.1111/isj.12457
Yenni Tim, Thiam Kian Chiew, Hooi Min Lim, Chin Hai Teo, Chirk Jenn Ng

As global disruptions escalate, digital resilience (DR)—the capacity to anticipate, absorb, and adapt to external shocks by leveraging Information Systems (IS)—has become crucial for individuals and organisations confronting and managing unprecedented crises. This research advances understanding on how to develop DR, drawing on insights from an Action Design Research (ADR) study conducted during the COVID-19 pandemic. Our research explores a particular facet of DR: the capacity to manage exogenous shocks through the design  of new IS solutions. We introduce the ADAPT framework, comprising five key enablers—Agility, Designation, Alignment, Participation, and Trust—recommended to support design teams developing IS solutions during and for crises. Our ADR project, which resulted in the creation of a telemonitoring system used by over 115 frontline healthcare workers to monitor the symptoms of more than 1000 COVID-19 patients, demonstrates the instrumental role these five enablers play in supporting a crisis-propelled IS design process that is urgent, resource-limited, and multi-partite. By presenting new design process knowledge and practical recommendations that guide crisis-driven IS design, we aim to equip design teams with the understanding they need to effectively navigate similar challenges in the future. We also hope to inspire and support IS researchers to apply their expertise in the design, deployment, and use of IS solutions to contribute to crisis-driven design endeavours that tackle the pressing and urgent challenges of our time.

随着全球破坏的升级,数字复原力(DR)——通过利用信息系统(IS)预测、吸收和适应外部冲击的能力——对面临和管理前所未有的危机的个人和组织来说至关重要。这项研究借鉴了2019冠状病毒病大流行期间进行的一项行动设计研究(ADR)的见解,促进了对如何开发DR的理解。我们的研究探索了DR的一个特定方面:通过设计新的IS解决方案来管理外部冲击的能力。我们介绍了ADAPT框架,该框架由五个关键因素组成——敏捷性、指定性、一致性、参与性和信任——建议用于支持设计团队在危机期间和危机时开发IS解决方案。我们的ADR项目创建了一个远程监测系统,115多名一线医护人员使用该系统监测1000多名新冠肺炎患者的症状,该项目证明了这五个促成因素在支持紧急、资源有限和多方参与的危机驱动的IS设计过程中发挥的重要作用。通过提供新的设计过程知识和指导危机驱动的IS设计的实用建议,我们的目标是让设计团队了解他们在未来有效应对类似挑战所需的知识。我们还希望激励和支持信息系统研究人员将他们的专业知识应用于信息系统解决方案的设计、部署和使用,为应对我们时代紧迫挑战的危机驱动的设计工作做出贡献。
{"title":"Design process knowledge for crisis-driven information systems solutions: Insights on building digital resilience from an action design research study","authors":"Yenni Tim,&nbsp;Thiam Kian Chiew,&nbsp;Hooi Min Lim,&nbsp;Chin Hai Teo,&nbsp;Chirk Jenn Ng","doi":"10.1111/isj.12457","DOIUrl":"10.1111/isj.12457","url":null,"abstract":"<p>As global disruptions escalate, digital resilience (DR)—the capacity to anticipate, absorb, and adapt to external shocks by leveraging Information Systems (IS)—has become crucial for individuals and organisations confronting and managing unprecedented crises. This research advances understanding on how to develop DR, drawing on insights from an Action Design Research (ADR) study conducted during the COVID-19 pandemic. Our research explores a particular facet of DR: the capacity to manage exogenous shocks through the <i>design</i>  of new IS solutions. We introduce the ADAPT framework, comprising five key enablers—Agility, Designation, Alignment, Participation, and Trust—recommended to support design teams developing IS solutions <i>during</i> and <i>for</i> crises. Our ADR project, which resulted in the creation of a telemonitoring system used by over 115 frontline healthcare workers to monitor the symptoms of more than 1000 COVID-19 patients, demonstrates the instrumental role these five enablers play in supporting a crisis-propelled IS design process that is urgent, resource-limited, and multi-partite. By presenting new design process knowledge and practical recommendations that guide crisis-driven IS design, we aim to equip design teams with the understanding they need to effectively navigate similar challenges in the future. We also hope to inspire and support IS researchers to apply their expertise in the design, deployment, and use of IS solutions to contribute to crisis-driven design endeavours that tackle the pressing and urgent challenges of our time.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 6","pages":"1343-1369"},"PeriodicalIF":6.4,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12457","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44846695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lead complementor involvement in the design of platform boundary resources: A case study of BMW's onboard apps 领导互补参与平台边界资源的设计:以宝马车载应用为例
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-07-06 DOI: 10.1111/isj.12449
Niklas Weiss, Maximilian Schreieck, Manuel Wiesche, Helmut Krcmar

An increasing number of companies have implemented digital platforms to attract complementors who create innovations on the platform. Establishing such digital platforms is a challenge for incumbent companies because they lack related experience and capabilities. In particular, boundary resources that are the interface between the platform and complementors need to be well-designed to attract complementors and keep them engaged. We propose that lead complementor involvement helps incumbent companies to improve the design of the platform boundary resources. In a multi-year action research study, we established lead complementor involvement in the boundary resource design of a digital platform for automotive onboard apps at the BMW Group and evaluated how boundary resources improved. Along three episodes, we illustrate that lead complementor involvement was effective and we summarise our findings in four propositions: (1) lead complementor involvement facilitates platform emergence for incumbent companies by enhancing boundary resource design, (2) lead complementor involvement is more efficient in higher platform layers, (3) lead complementor involvement is facilitated by an increase of intensity and frequency of interactions between complementors and platform owner and (4) establishing a complementor community helps to continuously identify opportunities for lead complementor involvement. We contribute to the information systems literature on platform emergence and design by focusing on the process of designing boundary resources and by considering the heterogeneity of complementors. Furthermore, we contextualise the concept of lead user involvement in the domain of digital platforms and compare and contrast lead complementors and lead users.

越来越多的公司已经实施了数字平台,以吸引在平台上进行创新的互补者。由于缺乏相关经验和能力,建立这样的数字平台对现有企业来说是一个挑战。特别是,作为平台和互补者之间的接口的边界资源需要精心设计,以吸引互补者并保持他们的参与。我们认为,领先互补参与有助于现有企业改进平台边界资源的设计。在一项多年的行动研究中,我们在宝马集团车载应用程序数字平台的边界资源设计中建立了领先的互补参与,并评估了边界资源的改进情况。通过三个章节,我们说明了领导互补参与是有效的,我们将我们的发现总结为四个命题:(1)通过加强边界资源设计,领先互补者参与促进了现有公司的平台涌现;(2)领先互补者参与在更高的平台层中效率更高;(3)领先互补者与平台所有者之间互动的强度和频率增加,促进了领先互补者参与;(4)建立互补者社区有助于持续识别领先互补者参与的机会。我们通过关注设计边界资源的过程和考虑互补资源的异质性,为平台出现和设计的信息系统文献做出贡献。此外,我们将领先用户参与的概念置于数字平台领域的背景下,并比较和对比领先互补者和领先用户。
{"title":"Lead complementor involvement in the design of platform boundary resources: A case study of BMW's onboard apps","authors":"Niklas Weiss,&nbsp;Maximilian Schreieck,&nbsp;Manuel Wiesche,&nbsp;Helmut Krcmar","doi":"10.1111/isj.12449","DOIUrl":"10.1111/isj.12449","url":null,"abstract":"<p>An increasing number of companies have implemented digital platforms to attract complementors who create innovations on the platform. Establishing such digital platforms is a challenge for incumbent companies because they lack related experience and capabilities. In particular, boundary resources that are the interface between the platform and complementors need to be well-designed to attract complementors and keep them engaged. We propose that lead complementor involvement helps incumbent companies to improve the design of the platform boundary resources. In a multi-year action research study, we established lead complementor involvement in the boundary resource design of a digital platform for automotive onboard apps at the BMW Group and evaluated how boundary resources improved. Along three episodes, we illustrate that lead complementor involvement was effective and we summarise our findings in four propositions: (1) lead complementor involvement facilitates platform emergence for incumbent companies by enhancing boundary resource design, (2) lead complementor involvement is more efficient in higher platform layers, (3) lead complementor involvement is facilitated by an increase of intensity and frequency of interactions between complementors and platform owner and (4) establishing a complementor community helps to continuously identify opportunities for lead complementor involvement. We contribute to the information systems literature on platform emergence and design by focusing on the process of designing boundary resources and by considering the heterogeneity of complementors. Furthermore, we contextualise the concept of lead user involvement in the domain of digital platforms and compare and contrast lead complementors and lead users.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 6","pages":"1279-1311"},"PeriodicalIF":6.4,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12449","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45316771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploration–Exploitation: How business analytics powers organisational ambidexterity for environmental sustainability 探索-开发:商业分析如何为环境可持续性提供组织灵活性
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-07-03 DOI: 10.1111/isj.12456
Yunfei Shi, Christine Van Toorn, Mikayla McEwan

Simultaneous exploration and exploitation (i.e., exploration–exploitation) can help a firm address short-term environmental requirements and ensure long-term environmental viability. Exploration–exploitation, however, challenges organisational practices because they compete for resources and time. While business analytics (BA) offers the potential to overcome these challenges, research to date offers very limited insights into how BA capabilities interact with ambidextrous capabilities to realise environmental value. We address this issue by conducting a comparative case study at a bank and at a real-estate trust through the theoretical lens of dynamic capabilities. We develop a process model to explain how BA powers ambidextrous practices to achieve sustainability outcomes over time. We uncover two mechanisms: a BA-powered context shaping mechanism by which BA powers contextual ambidexterity at the employee level using data availability, timeliness, and analytics culture; and a BA-powered resource linking mechanism by which BA powers structural ambidexterity at intra- and inter-organisational levels using holistic insights and analytics leadership. Our model highlights the contextual factors that condition the extent to which a firm moves along the continuum of exploration–exploitation. We also define a new dimension of sustainability outcomes which we label eco-awareness to explain how BA shapes employees' environmental alertness and enables the paradigm shift in an organisation's sustainability mindset.

同时进行勘探和开发(即勘探-开发)可以帮助企业满足短期的环境要求,并确保长期的环境可行性。然而,探索-开发会对组织实践造成挑战,因为它们会争夺资源和时间。虽然商业分析(BA)具有克服这些挑战的潜力,但迄今为止的研究对商业分析能力如何与双向能力相互作用以实现环境价值的见解非常有限。为了解决这一问题,我们从动态能力的理论视角出发,对一家银行和一家房地产信托公司进行了比较案例研究。我们建立了一个过程模型,以解释随着时间的推移,BA 是如何为实现可持续发展成果的双向实践提供动力的。我们发现了两种机制:一种是由管理局驱动的情境塑造机制,通过这种机制,管理局利用数据可用性、及时性和分析文化,在员工层面推动情境灵活性;另一种是由管理局驱动的资源链接机制,通过这种机制,管理局利用整体洞察力和分析领导力,在组织内部和组织间层面推动结构灵活性。我们的模型强调了制约企业沿着探索-开发连续统一体前进的背景因素。我们还定义了可持续发展成果的一个新维度,并将其命名为生态意识,以解释 BA 如何塑造员工的环境警觉性并促成组织可持续发展思维模式的转变。
{"title":"Exploration–Exploitation: How business analytics powers organisational ambidexterity for environmental sustainability","authors":"Yunfei Shi,&nbsp;Christine Van Toorn,&nbsp;Mikayla McEwan","doi":"10.1111/isj.12456","DOIUrl":"10.1111/isj.12456","url":null,"abstract":"<p>Simultaneous exploration and exploitation (i.e., exploration–exploitation) can help a firm address short-term environmental requirements and ensure long-term environmental viability. Exploration–exploitation, however, challenges organisational practices because they compete for resources and time. While business analytics (BA) offers the potential to overcome these challenges, research to date offers very limited insights into how BA capabilities interact with ambidextrous capabilities to realise environmental value. We address this issue by conducting a comparative case study at a bank and at a real-estate trust through the theoretical lens of dynamic capabilities. We develop a process model to explain how BA powers ambidextrous practices to achieve sustainability outcomes over time. We uncover two mechanisms: a <i>BA-powered context shaping</i> mechanism by which BA powers contextual ambidexterity at the employee level using data availability, timeliness, and analytics culture; and a <i>BA-powered resource linking</i> mechanism by which BA powers structural ambidexterity at intra- and inter-organisational levels using holistic insights and analytics leadership. Our model highlights the contextual factors that condition the extent to which a firm moves along the continuum of exploration–exploitation. We also define a new dimension of sustainability outcomes which we label eco-awareness to explain how BA shapes employees' environmental alertness and enables the paradigm shift in an organisation's sustainability mindset.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 3","pages":"894-930"},"PeriodicalIF":6.4,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12456","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42130181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information Systems Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1