Recent developments in information and communication technology have blurred the line between the workplace and the home. This can have a negative influence on employees' well-being and thus has gained increasing attention from academics and practitioners. In this study, we developed a research model based on the transactional perspective of stress and the challenge–hindrance stressor framework. We defined the two dimensions of work–family conflict as the perceptual stress resulting from a chronic challenge and hindrance technostressors, which ultimately affect employees' satisfaction in both the work and family domains. We tested our model using a three-wave time-lagged survey study with data collected from 268 employees. Challenge and hindrance technostressors had different effects on these two main forms of work–family conflict (time-based and strain-based) but further induced negative effects on both job and family satisfaction. Overall, we make both scientific and practical contributions to the fields of work-related technology use and work–family conflict.
{"title":"How technostressors influence job and family satisfaction: Exploring the role of work–family conflict","authors":"Si Shi, Yang Chen, Christy M. K. Cheung","doi":"10.1111/isj.12431","DOIUrl":"10.1111/isj.12431","url":null,"abstract":"<p>Recent developments in information and communication technology have blurred the line between the workplace and the home. This can have a negative influence on employees' well-being and thus has gained increasing attention from academics and practitioners. In this study, we developed a research model based on the transactional perspective of stress and the challenge–hindrance stressor framework. We defined the two dimensions of work–family conflict as the perceptual stress resulting from a chronic challenge and hindrance technostressors, which ultimately affect employees' satisfaction in both the work and family domains. We tested our model using a three-wave time-lagged survey study with data collected from 268 employees. Challenge and hindrance technostressors had different effects on these two main forms of work–family conflict (time-based and strain-based) but further induced negative effects on both job and family satisfaction. Overall, we make both scientific and practical contributions to the fields of work-related technology use and work–family conflict.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 4","pages":"953-985"},"PeriodicalIF":6.4,"publicationDate":"2023-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12431","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46880551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital platforms are supraorganizational entities that use digital technology to facilitate interactions between diverse actors, leading to novel forms of organisation and accompanying forms of control. The current Information Systems (IS) literature, however, struggles to describe control on digital platforms in a way that does justice to the dynamic character of the phenomenon. Taking this as an opportunity, we follow the enactment of control over time and across parties in a hybrid ethnographic study of the social commerce platform Poshmark. Specifically, we conceptualise the dynamics of control as changes in the means of control—formal or informal—and the sources of control—operator or participants—over time. Tracking these conceptual dimensions, we identify the distinct ways control has changed on Poshmark. Synthesising these findings into four dynamics of control, we show that control on digital platforms is rarely static due to aggregate effects arising from the operator and from participant interactions with each other through the digital features deployed on the platform. Based on these insights, our study contributes to the IS literature on control by broadening the conception of control on digital platforms. The theoretical and practical insights generated in this paper thereby lay the foundation for the systematic study of the dynamics of control that are unique to platform environments.
{"title":"Dynamics of control on digital platforms","authors":"Nicola Ens, Philipp Hukal, Tina Blegind Jensen","doi":"10.1111/isj.12429","DOIUrl":"10.1111/isj.12429","url":null,"abstract":"<p>Digital platforms are supraorganizational entities that use digital technology to facilitate interactions between diverse actors, leading to novel forms of organisation and accompanying forms of control. The current Information Systems (IS) literature, however, struggles to describe control on digital platforms in a way that does justice to the dynamic character of the phenomenon. Taking this as an opportunity, we follow the enactment of control over time and across parties in a hybrid ethnographic study of the social commerce platform Poshmark. Specifically, we conceptualise the dynamics of control as changes in the means of control—formal or informal—and the sources of control—operator or participants—over time. Tracking these conceptual dimensions, we identify the distinct ways control has changed on Poshmark. Synthesising these findings into four dynamics of control, we show that control on digital platforms is rarely static due to aggregate effects arising from the operator and from participant interactions with each other through the digital features deployed on the platform. Based on these insights, our study contributes to the IS literature on control by broadening the conception of control on digital platforms. The theoretical and practical insights generated in this paper thereby lay the foundation for the systematic study of the dynamics of control that are unique to platform environments.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 4","pages":"890-911"},"PeriodicalIF":6.4,"publicationDate":"2023-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12429","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43897917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christine Abdalla Mikhaeil, Richard L. Baskerville
From #Pizzagate to anti-vaxxers, passing by 9/11 or Obama ‘birthers’, we have seen many communities growing on social media around conspiracy theories and thereby gaining public prominence. Debunking or presenting alternative views to conspiracy theories often fails because individuals within these communities can grow more resolute, encouraging and reinforcing their beliefs online. Instead of withering in the face of contradiction, such communities hunker down; escalating their commitment to their conspiratorial beliefs. By interacting over social media platforms, they develop a sense of a shared social identity, which in turn fosters escalating behaviours and can lead to radicalization. For some people, the choice of abandoning or moderating these beliefs is unthinkable because they are too deeply invested to quit. This study advances a second-order affordance for identity-driven escalation that explains the process of conspiracy theory radicalization within online communities. We offer a theoretical account of the way social media platforms contribute to escalating commitment to conspiracy radicalization. We show how the sequential and combined actualization of first-order affordances of the technology enables a second-order affordance for escalation.
{"title":"Explaining online conspiracy theory radicalization: A second-order affordance for identity-driven escalation","authors":"Christine Abdalla Mikhaeil, Richard L. Baskerville","doi":"10.1111/isj.12427","DOIUrl":"10.1111/isj.12427","url":null,"abstract":"<p>From #Pizzagate to anti-vaxxers, passing by 9/11 or Obama ‘birthers’, we have seen many communities growing on social media around conspiracy theories and thereby gaining public prominence. Debunking or presenting alternative views to conspiracy theories often fails because individuals within these communities can grow more resolute, encouraging and reinforcing their beliefs online. Instead of withering in the face of contradiction, such communities hunker down; escalating their commitment to their conspiratorial beliefs. By interacting over social media platforms, they develop a sense of a shared social identity, which in turn fosters escalating behaviours and can lead to radicalization. For some people, the choice of abandoning or moderating these beliefs is unthinkable because they <i>are</i> too deeply invested to quit. This study advances a second-order affordance for identity-driven escalation that explains the process of conspiracy theory radicalization within online communities. We offer a theoretical account of the way social media platforms contribute to escalating commitment to conspiracy radicalization. We show how the sequential and combined actualization of first-order affordances <i>of</i> the technology enables a second-order affordance <i>for</i> escalation.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 3","pages":"711-735"},"PeriodicalIF":6.4,"publicationDate":"2023-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49512691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Organisations implement a variety of knowledge mechanisms such as information security education, training and awareness (SETA) programs and information security policies, to influence employees' secure behaviour. Despite increased efforts to provide information systems (IS) security knowledge to employees, data breaches and other security incidents resulting from insider behaviour continue. Recent IS security research, primarily grounded on assumptions of employees' rational assessment of numerous factors, has yielded inconsistent results. Challenging this paradigm, we model secure behaviour on security knowledge mechanisms, which focuses on the multidimensional nature of security knowledge breadth, depth and finesse to represent the full array of managerial levers. We further draw on construal level theory to conceptualise users' perceptual judgements of security messages. Two studies support our model, with the second building on the first. Study 1, an experiment with 312 participants, focused on validating the treatments. Study 2, a survey with 219 participants, validated the entire model. Results showed that our model has significantly more explanatory and predictive power than the orthodox paradigm. Our results have practical implications for optimising the organisation of knowledge mechanisms by emphasising the personal relevance of threats and defining the factors that lead to secure behaviour. We also contribute to the discourse on information security research and provide a template for integrating theories, thus opening new avenues for future research.
{"title":"The effects of knowledge mechanisms on employees' information security threat construal","authors":"Ashraf Mady, Saurabh Gupta, Merrill Warkentin","doi":"10.1111/isj.12424","DOIUrl":"10.1111/isj.12424","url":null,"abstract":"<p>Organisations implement a variety of knowledge mechanisms such as information security education, training and awareness (SETA) programs and information security policies, to influence employees' secure behaviour. Despite increased efforts to provide information systems (IS) security knowledge to employees, data breaches and other security incidents resulting from insider behaviour continue. Recent IS security research, primarily grounded on assumptions of employees' rational assessment of numerous factors, has yielded inconsistent results. Challenging this paradigm, we model secure behaviour on security knowledge mechanisms, which focuses on the multidimensional nature of security knowledge breadth, depth and finesse to represent the full array of managerial levers. We further draw on construal level theory to conceptualise users' perceptual judgements of security messages. Two studies support our model, with the second building on the first. Study 1, an experiment with 312 participants, focused on validating the treatments. Study 2, a survey with 219 participants, validated the entire model. Results showed that our model has significantly more explanatory and predictive power than the orthodox paradigm. Our results have practical implications for optimising the organisation of knowledge mechanisms by emphasising the personal relevance of threats and defining the factors that lead to secure behaviour. We also contribute to the discourse on information security research and provide a template for integrating theories, thus opening new avenues for future research.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 4","pages":"790-841"},"PeriodicalIF":6.4,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41454126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Opinion polarisation in social media has recently become a significant issue. The existing literature mainly attributes polarisation to online friends' informational social influence, that is, users are more likely to interact with others with similar opinions, which leads to the echo chamber effect. However, the impact of social interaction on individual polarisation may also result from normative social influence, which varies with social settings on the platform. In this paper, we leverage a quasi-experiment to investigate the normative social influence of online friends on focal users' review polarity. We use fixed effects and difference-in-differences approaches, along with propensity score matching, to address the potential endogeneity in users' friend function adoption decisions. Our results indicate that adopting the friend function leads users to post less extreme ratings. We further separate the reviews into positive and negative, finding that the reduction in the review polarity for positive reviews is more prominent than for negative ones. Regarding user heterogeneity, our causal forest analysis uncovers that users with a higher engagement level on the platform are less affected by adopting the friend function than those with less engagement. Our study has clear implications for managers and platform designers, highlighting the importance of social function design in reducing social media induced polarisation.
{"title":"Befriended to polarise? The impact of friend identity on review polarisation—A quasi-experiment","authors":"Lin Wang, Chong (Alex) Wang, Xinyan Yao","doi":"10.1111/isj.12425","DOIUrl":"10.1111/isj.12425","url":null,"abstract":"<p>Opinion polarisation in social media has recently become a significant issue. The existing literature mainly attributes polarisation to online friends' informational social influence, that is, users are more likely to interact with others with similar opinions, which leads to the echo chamber effect. However, the impact of social interaction on individual polarisation may also result from normative social influence, which varies with social settings on the platform. In this paper, we leverage a quasi-experiment to investigate the normative social influence of online friends on focal users' review polarity. We use fixed effects and difference-in-differences approaches, along with propensity score matching, to address the potential endogeneity in users' friend function adoption decisions. Our results indicate that adopting the friend function leads users to post less extreme ratings. We further separate the reviews into positive and negative, finding that the reduction in the review polarity for positive reviews is more prominent than for negative ones. Regarding user heterogeneity, our causal forest analysis uncovers that users with a higher engagement level on the platform are less affected by adopting the friend function than those with less engagement. Our study has clear implications for managers and platform designers, highlighting the importance of social function design in reducing social media induced polarisation.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 3","pages":"680-710"},"PeriodicalIF":6.4,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46235696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Existing research on technology affordance rarely considers the role of social structures in shaping the interaction between human actors and technology. In this paper, we draw upon the concept of social positioning to explore how socialized affordances of technology adoption, as well as their impact in work and social life, are shaped by the social positions that human actors occupy within multiple social structures. We do so by examining the adoption of mHealth devices by community health workers in India. The study generates theoretical implications for research on affordances of technology and social structures by integrating social positioning of actors in the analysis of a digital practice, and enriching IS research by incorporating the broader social arrangements and power relations.
{"title":"Social positioning matters: A socialized affordance perspective of mHealth in India","authors":"Priyanka Pandey, Yingqin Zheng","doi":"10.1111/isj.12421","DOIUrl":"10.1111/isj.12421","url":null,"abstract":"<p>Existing research on technology affordance rarely considers the role of social structures in shaping the interaction between human actors and technology. In this paper, we draw upon the concept of social positioning to explore how socialized affordances of technology adoption, as well as their impact in work and social life, are shaped by the social positions that human actors occupy within multiple social structures. We do so by examining the adoption of mHealth devices by community health workers in India. The study generates theoretical implications for research on affordances of technology and social structures by integrating social positioning of actors in the analysis of a digital practice, and enriching IS research by incorporating the broader social arrangements and power relations.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 4","pages":"703-732"},"PeriodicalIF":6.4,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12421","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44177218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
<p>In 2020, we noticed significant spikes in the JIFs of several leading information systems (IS) journals, both inside and outside the Association for Information Systems (AIS) basket of eight (AIS-8) premier journals. A moderate degree of JIF fluctuation is normal, and a few journals increase steadily year after year, but the changes in 2020 were remarkable. For example, the JIF for the <i>Journal of Strategic Information Systems</i> (<i>JSIS</i>) rose from 3.949 in 2019 to 7.838 in 2020; likewise, the JIF for <i>Information & Organisation</i> (<i>I&O</i>), rose from 3.300 to 6.300. Every other major IS journal saw significant increases. In analysing the patterns, our scope embraces 13 journals, beginning with the AIS-8: <i>European Journal of Information Systems</i> (<i>EJIS</i>), <i>Information Systems Journal</i> (<i>ISJ</i>), <i>Information Systems Research</i> (<i>ISR</i>), <i>Journal of Information Technology</i> (<i>JIT</i>), <i>Journal of the Association for Information Systems</i> (<i>JAIS</i>), <i>Journal of Management Information Systems</i> (<i>JMIS</i>), <i>Journal of Strategic Information Systems</i> (<i>JSIS</i>), and <i>Management Information Systems Quarterly</i> (<i>MISQ</i>). We also included five well-regarded and highly cited IS journals outside the AIS-8: <i>Decision Support Systems</i> (<i>DSS</i>), <i>Information & Management</i> (<i>I&M</i>), <i>Information & Organisation</i> (<i>I&O</i>), <i>International Journal of Information Management</i> (<i>IJIM</i>), and <i>IT & People</i> (<i>IT&P</i>).</p><p>What can we learn from this trawl through the recent journal citation data? What are the implications for the journals and their various stakeholders? Several prominent trends emerge, notably, the short-term skewing effect of highly cited articles, the impact of self-citation, and the great extent to which IS research is cited in articles appearing in many other journals and conferences, some of which are in disciplines far removed from IS. A more detailed analysis of the kinds of article that are highly cited may be valuable; the tentative analysis here suggests that reviews, research agendas, research frameworks, and methods articles are particularly well received. COVID-19 has provided a topic of global interest and significance, and many COVID-19-related articles are well cited, but it may well be that many others are not cited. Indeed, it is instructive to examine the tail of zeros (see Table 11): the articles that are not cited at all and thus contribute only to the attenuating effect of the denominator and not the aggrandizing effect of the numerator in the JIF calculation.</p><p>We suggest that these data may be of considerable concern to editors and publishers. Although a couple of journals have only one uncited article, several journals reach double figures (10–28 articles), with as many as 17.5% of citable articles being uncited. High numbers of uncited articles will naturally dim
每年7月,都会发布上一年的期刊影响因子。尽管我们承认一种长期存在的反对意见,即拒绝这种期刊级别的指标,并认为只应评估文章级别的质量和影响,或建议采取其他影响措施(例如,Bollen等人,2005年;Leydesdorf,2012年),但人们热切期待将JIF作为期刊质量和影响的指标(Lowry et al.,2013)。我们也承认与期刊影响的科学计量分析相关的固有风险(参见Clarke,2016),特别是在推断任何人(出版商、编辑、作者或读者)可能会因该分析而做什么时。报告最多的联合执行框架涵盖两年,传统计算如下:
{"title":"ISJ editorial: Addressing the implications of recent developments in journal impact factors","authors":"Robert M. Davison, Paul Benjamin Lowry","doi":"10.1111/isj.12426","DOIUrl":"10.1111/isj.12426","url":null,"abstract":"<p>In 2020, we noticed significant spikes in the JIFs of several leading information systems (IS) journals, both inside and outside the Association for Information Systems (AIS) basket of eight (AIS-8) premier journals. A moderate degree of JIF fluctuation is normal, and a few journals increase steadily year after year, but the changes in 2020 were remarkable. For example, the JIF for the <i>Journal of Strategic Information Systems</i> (<i>JSIS</i>) rose from 3.949 in 2019 to 7.838 in 2020; likewise, the JIF for <i>Information & Organisation</i> (<i>I&O</i>), rose from 3.300 to 6.300. Every other major IS journal saw significant increases. In analysing the patterns, our scope embraces 13 journals, beginning with the AIS-8: <i>European Journal of Information Systems</i> (<i>EJIS</i>), <i>Information Systems Journal</i> (<i>ISJ</i>), <i>Information Systems Research</i> (<i>ISR</i>), <i>Journal of Information Technology</i> (<i>JIT</i>), <i>Journal of the Association for Information Systems</i> (<i>JAIS</i>), <i>Journal of Management Information Systems</i> (<i>JMIS</i>), <i>Journal of Strategic Information Systems</i> (<i>JSIS</i>), and <i>Management Information Systems Quarterly</i> (<i>MISQ</i>). We also included five well-regarded and highly cited IS journals outside the AIS-8: <i>Decision Support Systems</i> (<i>DSS</i>), <i>Information & Management</i> (<i>I&M</i>), <i>Information & Organisation</i> (<i>I&O</i>), <i>International Journal of Information Management</i> (<i>IJIM</i>), and <i>IT & People</i> (<i>IT&P</i>).</p><p>What can we learn from this trawl through the recent journal citation data? What are the implications for the journals and their various stakeholders? Several prominent trends emerge, notably, the short-term skewing effect of highly cited articles, the impact of self-citation, and the great extent to which IS research is cited in articles appearing in many other journals and conferences, some of which are in disciplines far removed from IS. A more detailed analysis of the kinds of article that are highly cited may be valuable; the tentative analysis here suggests that reviews, research agendas, research frameworks, and methods articles are particularly well received. COVID-19 has provided a topic of global interest and significance, and many COVID-19-related articles are well cited, but it may well be that many others are not cited. Indeed, it is instructive to examine the tail of zeros (see Table 11): the articles that are not cited at all and thus contribute only to the attenuating effect of the denominator and not the aggrandizing effect of the numerator in the JIF calculation.</p><p>We suggest that these data may be of considerable concern to editors and publishers. Although a couple of journals have only one uncited article, several journals reach double figures (10–28 articles), with as many as 17.5% of citable articles being uncited. High numbers of uncited articles will naturally dim","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 3","pages":"419-436"},"PeriodicalIF":6.4,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12426","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41312933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The current technology epoch—sometimes called the fourth industrial revolution (4IR)—involves the innovative application of rapidly advancing digital technologies such as artificial intelligence. Societal implications of the 4IR are significant and wide-ranging, from life-saving drug development to privacy loss and app addiction. A review of the information systems literature, however, reveals a narrow focus on technology-enabled business benefits. Scant research attention has been paid to the role of humans and humanistic outcomes. To spur new research addressing these issues, formalised affordance theory is employed to develop a new 4IR conceptualization. Four groupings of affordances that capture salient 4IR action possibilities are developed within two categories: machine emulation of human cognition (expansive decision-making and creativity automation) and machine emulation of human communication (relationship with humans and intermachine teaming). Implications are explored in the context of human-machine coworking and the development of artificial intelligence safety regulations. Overall, the affordance conceptualization of the 4IR advances a new sociotechnical lexicon of action possibilities and their joint enactment in achieving humanistic and instrumental outcomes, enabling alignment of the scope of 4IR research with the scope of 4IR phenomena—and bringing humans back into the loop.
{"title":"Putting humans back in the loop: An affordance conceptualization of the 4th industrial revolution","authors":"Nigel P. Melville, Lionel Robert, Xiao Xiao","doi":"10.1111/isj.12422","DOIUrl":"10.1111/isj.12422","url":null,"abstract":"<p>The current technology epoch—sometimes called the fourth industrial revolution (4IR)—involves the innovative application of rapidly advancing digital technologies such as artificial intelligence. Societal implications of the 4IR are significant and wide-ranging, from life-saving drug development to privacy loss and app addiction. A review of the information systems literature, however, reveals a narrow focus on technology-enabled business benefits. Scant research attention has been paid to the role of humans and humanistic outcomes. To spur new research addressing these issues, formalised affordance theory is employed to develop a new 4IR conceptualization. Four groupings of affordances that capture salient 4IR action possibilities are developed within two categories: machine emulation of human cognition (expansive decision-making and creativity automation) and machine emulation of human communication (relationship with humans and intermachine teaming). Implications are explored in the context of human-machine coworking and the development of artificial intelligence safety regulations. Overall, the affordance conceptualization of the 4IR advances a new sociotechnical lexicon of action possibilities and their joint enactment in achieving humanistic and instrumental outcomes, enabling alignment of the scope of 4IR research with the scope of 4IR phenomena—and bringing humans back into the loop.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 4","pages":"733-757"},"PeriodicalIF":6.4,"publicationDate":"2022-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48790219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
While organisations are increasingly interested in artificial intelligence (AI), many AI projects encounter significant issues or even fail. To gain a deeper understanding of the issues that arise during these projects and the practices that contribute to addressing them, we study the case of Consult, a North American AI consulting firm that helps organisations leverage the power of AI by providing custom solutions. The management of AI projects at Consult is a multi-method approach that draws on elements from traditional project management, agile practices, and AI workflow practices. While the combination of these elements enables Consult to be effective in delivering AI projects to their customers, our analysis reveals that managing AI projects in this way draw upon three core logics, that is, commonly shared norms, values, and prescribed behaviours which influence actors' understanding of how work should be done. We identify that the simultaneous presence of these three logics—a traditional project management logic, an agile logic, and an AI workflow logic—gives rise to conflicts and issues in managing AI projects at Consult, and successfully managing these AI projects involves resolving conflicts that arise between them. From our case findings, we derive four strategies to help organisations better manage their AI projects.
{"title":"Managing artificial intelligence projects: Key insights from an AI consulting firm","authors":"Gregory Vial, Ann-Frances Cameron, Tanya Giannelia, Jinglu Jiang","doi":"10.1111/isj.12420","DOIUrl":"10.1111/isj.12420","url":null,"abstract":"<p>While organisations are increasingly interested in artificial intelligence (AI), many AI projects encounter significant issues or even fail. To gain a deeper understanding of the issues that arise during these projects and the practices that contribute to addressing them, we study the case of Consult, a North American AI consulting firm that helps organisations leverage the power of AI by providing custom solutions. The management of AI projects at Consult is a multi-method approach that draws on elements from traditional project management, agile practices, and AI workflow practices. While the combination of these elements enables Consult to be effective in delivering AI projects to their customers, our analysis reveals that managing AI projects in this way draw upon three core <i>logics</i>, that is, commonly shared norms, values, and prescribed behaviours which influence actors' understanding of how work should be done. We identify that the simultaneous presence of these three logics—a traditional project management logic, an agile logic, and an AI workflow logic—gives rise to conflicts and issues in managing AI projects at Consult, and successfully managing these AI projects involves resolving conflicts that arise between them. From our case findings, we derive four strategies to help organisations better manage their AI projects.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 3","pages":"669-691"},"PeriodicalIF":6.4,"publicationDate":"2022-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12420","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48090816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The success of crowdsourcing (CS) systems depends on sustained participation, which is an ongoing challenge for the majority of CS providers. Unfortunately, participants are frequently demotivated by technical difficulties and the incorrect use of CS systems, which can result in CS failure. Although the literature generally assumes that sustained participation in CS is determined by a shift between intrinsic and extrinsic motivation, the role of system-use practices in facilitating such a shift remains unknown. We explore how CS system-use practices influence participants' sustained motivation, evolving from initiation to progression to sustention. Using the notion of technology-in-practice as a lens, we develop and examine a process model using an in-depth case study of a large-scale ongoing CS project, the Australian Newspaper Digitisation Program. The findings suggest that CS participants' motivation is shaped by an evolving combination of three basic components (i.e., contextual condition, outcome and action intensity) and mediated by two types of system-use practice (i.e., passive and active). Passive-use practices facilitate sustaining motivation from initiation to progression, whereas active-use practices have a key role in sustention. Our study contributes to the emerging literature on the substantial role of system-use practices in sustaining motivation, resulting in sustained participation. The findings also offer actionable insights into improving the viability of CS systems in retaining and motivating continuous and increased contributions from participants.
{"title":"The role of system-use practices for sustaining motivation in crowdsourcing: A technology-in-practice perspective","authors":"Sultana Lubna Alam, Ruonan Sun","doi":"10.1111/isj.12423","DOIUrl":"10.1111/isj.12423","url":null,"abstract":"<p>The success of crowdsourcing (CS) systems depends on sustained participation, which is an ongoing challenge for the majority of CS providers. Unfortunately, participants are frequently demotivated by technical difficulties and the incorrect use of CS systems, which can result in CS failure. Although the literature generally assumes that sustained participation in CS is determined by a shift between intrinsic and extrinsic motivation, the role of system-use practices in facilitating such a shift remains unknown. We explore how CS system-use practices influence participants' sustained motivation, evolving from initiation to progression to sustention. Using the notion of technology-in-practice as a lens, we develop and examine a process model using an in-depth case study of a large-scale ongoing CS project, the Australian Newspaper Digitisation Program. The findings suggest that CS participants' motivation is shaped by an evolving combination of three basic components (i.e., contextual condition, outcome and action intensity) and mediated by two types of system-use practice (i.e., passive and active). Passive-use practices facilitate sustaining motivation from initiation to progression, whereas active-use practices have a key role in sustention. Our study contributes to the emerging literature on the substantial role of system-use practices in sustaining motivation, resulting in sustained participation. The findings also offer actionable insights into improving the viability of CS systems in retaining and motivating continuous and increased contributions from participants.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"33 4","pages":"758-789"},"PeriodicalIF":6.4,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12423","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43567837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}