It is well known that corporations rely on open source software as part of their product development lifecycle. Given these commitments, understanding the health of open source communities is a central concern in today's business setting. Our research uses social comparison theory as a framework for understanding how open source communities consider community health beyond any single metric within any single open source community—including a broader view of how others are using these health indicators in practice. Using methods from engaged field research, including 38 interviews, we examine practices of social comparison as an advancement in understanding open source community health—and subsequently engagement with open source communities. The results of this study show that open source community health is not a single set of discrete metrics but is an ongoing social construction. Through our study, we advance theoretical and applied knowledge regarding issues of open source community health, open source community engagement, and social comparison.
{"title":"An empirical investigation of social comparison and open source community health","authors":"Kevin Lumbard, Matt Germonprez, Sean Goggins","doi":"10.1111/isj.12485","DOIUrl":"10.1111/isj.12485","url":null,"abstract":"<p>It is well known that corporations rely on open source software as part of their product development lifecycle. Given these commitments, understanding the health of open source communities is a central concern in today's business setting. Our research uses social comparison theory as a framework for understanding how open source communities consider community health beyond any single metric within any single open source community—including a broader view of how others are using these health indicators in practice. Using methods from engaged field research, including 38 interviews, we examine practices of social comparison as an advancement in understanding open source community health—and subsequently engagement with open source communities. The results of this study show that open source community health is not a single set of discrete metrics but is an ongoing social construction. Through our study, we advance theoretical and applied knowledge regarding issues of open source community health, open source community engagement, and social comparison.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"499-532"},"PeriodicalIF":6.4,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139274666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prosocial punishments by social media bystanders could block the path from misinformation spread to social media-induced polarization (SMIP). However, prosocial punishments are inadequate for SMIP management because of the personal costs, and few studies propose effective ways to mobilize bystanders. The Chinese government implemented a regulation in 2017 to mobilize bystanders on social media through allocating accountability to act as misinformation supervisors. In China's guanxi culture, prosocial punishments are less observed considering the additional personal costs caused by breaking guanxi. Therefore, assessing the effectiveness of China's cyberspace accountability mobilization can help identify an effective tool for other governments to mitigate SMIP. We used a vignette survey experiment to collect data from WeChat users and applied a random regression model to analyse the data. Accountability mobilization significantly promotes bystanders' prosocial punishment to block the misinformation-spread-to-SMIP path. Guanxi negatively moderates the relationship between accountability mobilization and prosocial punishment to the above path. The government could encourage the public to actively take prosocial punishments by using the new tool of accountability mobilization. Guanxi culture reduces the effectiveness of the tool.
{"title":"Accountability mobilization, guanxi and social media-induced polarization: Understanding the bystander's prosocial punishment to misinformation spreader","authors":"Zhe Zhu, Nan Zhang, Meiwen Ding, Lei Chen","doi":"10.1111/isj.12486","DOIUrl":"10.1111/isj.12486","url":null,"abstract":"<p>Prosocial punishments by social media bystanders could block the path from misinformation spread to social media-induced polarization (SMIP). However, prosocial punishments are inadequate for SMIP management because of the personal costs, and few studies propose effective ways to mobilize bystanders. The Chinese government implemented a regulation in 2017 to mobilize bystanders on social media through allocating accountability to act as misinformation supervisors. In China's guanxi culture, prosocial punishments are less observed considering the additional personal costs caused by breaking guanxi. Therefore, assessing the effectiveness of China's cyberspace accountability mobilization can help identify an effective tool for other governments to mitigate SMIP. We used a vignette survey experiment to collect data from WeChat users and applied a random regression model to analyse the data. Accountability mobilization significantly promotes bystanders' prosocial punishment to block the misinformation-spread-to-SMIP path. Guanxi negatively moderates the relationship between accountability mobilization and prosocial punishment to the above path. The government could encourage the public to actively take prosocial punishments by using the new tool of accountability mobilization. Guanxi culture reduces the effectiveness of the tool.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"1116-1143"},"PeriodicalIF":6.4,"publicationDate":"2023-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135038492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrew Hardin, Robert M. Davison, Christoph Schneider, Clayton A. Looney, Suprateek Sarker
One factor receiving contemporary interest from virtual team researchers is collective-level efficacy, that is, a team's shared belief in its collective abilities to work effectively. However, our understanding of this literature leads to two concerns. First, depending on traditional team-focused collective-level efficacy concepts conveys an indifferent view of technology that ignores decades of research explaining how virtual teams' reliance on collaborative technologies differentiates them from traditional teams. Second, the information systems literature has largely ignored the concept of collective-level efficacy in virtual team research. That collective-level efficacy is underexamined in IS research is disappointing, given the growing recognition (outside the IS literature) that it is crucial to virtual team success. This absence becomes even more concerning given that IS researchers developed the concept of virtual team efficacy (VTE) specifically for virtual team settings. Unlike collective-level efficacy measures designed for traditional team settings, VTE incorporates technology into its conceptual definition and the operationalization of its measurement indicators. Thus, it is a stronger predictor of virtual team outcomes. To demonstrate its importance to IS research, we used a deductive theory-driven approach to propose and empirically evaluate whether VTE indirectly acts on virtual team effectiveness through the critical concepts of trust and participants' perceptions of problems associated with the collaboration inhibitors of time difference, geographical separation, and cultural differences. This research contributes significantly to the literature by confirming VTE's relationship to important virtual team success factors and informing IS researchers about the appropriate choice of constructs when studying collective-level efficacy in virtual team settings.
当代虚拟团队研究人员关注的一个因素是集体层面的效能,即团队对其有效工作的集体能力的共同信念。然而,我们对这一文献的理解导致了两个问题。首先,依赖于传统的以团队为中心的集体效能概念传达了一种对技术漠不关心的观点,忽略了数十年来解释虚拟团队对协作技术的依赖如何使其有别于传统团队的研究。其次,信息系统文献在很大程度上忽视了虚拟团队研究中的集体效能概念。鉴于越来越多的人(在信息系统文献之外)认识到,集体层面的效能对于虚拟团队的成功至关重要,因此信息系统研究中对集体层面效能的研究不足令人失望。鉴于 IS 研究人员专门针对虚拟团队环境提出了虚拟团队效能(VTE)的概念,这种缺失就更加令人担忧了。与为传统团队环境设计的集体层面效能测量不同,VTE 将技术纳入其概念定义和测量指标的操作中。因此,它更能预测虚拟团队的成果。为了证明 VTE 对 IS 研究的重要性,我们采用了一种演绎理论驱动的方法,提出并实证评估了 VTE 是否通过信任和参与者对与时差、地理分离和文化差异等合作抑制因素相关的问题的感知等关键概念间接影响虚拟团队的效能。这项研究证实了 VTE 与重要的虚拟团队成功因素之间的关系,并告知信息系统研究人员在研究虚拟团队环境中的集体效能时应如何选择适当的建构。
{"title":"Contextualising collective efficacy in virtual team research: The essential role of collaborative technologies in the virtual team efficacy conceptual framework","authors":"Andrew Hardin, Robert M. Davison, Christoph Schneider, Clayton A. Looney, Suprateek Sarker","doi":"10.1111/isj.12484","DOIUrl":"10.1111/isj.12484","url":null,"abstract":"<p>One factor receiving contemporary interest from virtual team researchers is collective-level efficacy, that is, a team's shared belief in its collective abilities to work effectively. However, our understanding of this literature leads to two concerns. First, depending on traditional team-focused collective-level efficacy concepts conveys an indifferent view of technology that ignores decades of research explaining how virtual teams' reliance on collaborative technologies differentiates them from traditional teams. Second, the information systems literature has largely ignored the concept of collective-level efficacy in virtual team research. That collective-level efficacy is underexamined in IS research is disappointing, given the growing recognition (outside the IS literature) that it is crucial to virtual team success. This absence becomes even more concerning given that IS researchers developed the concept of virtual team efficacy (VTE) specifically for virtual team settings. Unlike collective-level efficacy measures designed for traditional team settings, VTE incorporates technology into its conceptual definition and the operationalization of its measurement indicators. Thus, it is a stronger predictor of virtual team outcomes. To demonstrate its importance to IS research, we used a deductive theory-driven approach to propose and empirically evaluate whether VTE indirectly acts on virtual team effectiveness through the critical concepts of trust and participants' perceptions of problems associated with the collaboration inhibitors of time difference, geographical separation, and cultural differences. This research contributes significantly to the literature by confirming VTE's relationship to important virtual team success factors and informing IS researchers about the appropriate choice of constructs when studying collective-level efficacy in virtual team settings.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"469-498"},"PeriodicalIF":6.4,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135540050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There is no doubt that digital technologies have an impact on boundary work, that is, the practices individuals develop to work up boundaries between ‘work’ and ‘life’. However, related research is still dominated by the integration–segmentation framework which may restrict our understanding of contemporary practice. To address this limitation, we use the concepts of hybridity (fusion) and liminality (in-betweenness) in combination to explore how their interplay may promote more nuanced accounts of how individuals work up their boundaries in contemporary everyday life. Our analysis of video diaries and follow-up interviews undertaken by 30 UK-based workers reveals an ‘agentic interplay’ of hybridity and liminality that is understood as an ongoing dynamic practice, sometimes enabling and sometimes undermining desired boundary work outcomes. We make three contributions, collectively offering a critical advancement in the work–life debate and the hybridity and liminality literatures: (a) further developing an understanding of boundary work as situated, creative and dynamic; (b) unpacking the agentic potential of the ‘black box’ of the hybridity–liminality interplay; and (c) expanding current understandings and applications of the concepts of hybridity and liminality.
{"title":"Agentic interplay between hybridity and liminality in contemporary boundary work","authors":"Petros Chamakiotis, Gillian Symon, Rebecca Whiting","doi":"10.1111/isj.12477","DOIUrl":"10.1111/isj.12477","url":null,"abstract":"<p>There is no doubt that digital technologies have an impact on boundary work, that is, the practices individuals develop to work up boundaries between ‘work’ and ‘life’. However, related research is still dominated by the integration–segmentation framework which may restrict our understanding of contemporary practice. To address this limitation, we use the concepts of hybridity (fusion) and liminality (in-betweenness) in combination to explore how their interplay may promote more nuanced accounts of how individuals work up their boundaries in contemporary everyday life. Our analysis of video diaries and follow-up interviews undertaken by 30 UK-based workers reveals an ‘agentic interplay’ of hybridity and liminality that is understood as an ongoing dynamic practice, sometimes <i>enabling</i> and sometimes <i>undermining</i> desired boundary work outcomes. We make three contributions, collectively offering a critical advancement in the work–life debate and the hybridity and liminality literatures: (a) further developing an understanding of boundary work as situated, creative and dynamic; (b) unpacking the agentic potential of the ‘black box’ of the hybridity–liminality interplay; and (c) expanding current understandings and applications of the concepts of hybridity and liminality.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 1","pages":"261-283"},"PeriodicalIF":6.4,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12477","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135813857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khalid Durani, Andreas Eckhardt, Walid Durani, Tim Kollmer, Nils Augustin
Gatekeepers, including prerogative elites and institutions, possess multifaceted tools for controlling information. Historically, these gatekeepers have systematically instrumentalized visual information to shape audience perceptions in alignment with specific agendas. However, the advent of social media platforms has disrupted these power dynamics, empowering audiences through user-driven visual information exchanges. This has led to visual audience gatekeeping whereby users act as audience gatekeepers by selectively disseminating visual content, thus shaping information diffusion. While this democratisation of gatekeeping holds considerable promise for user empowerment, it also presents risks. These risks stem from the inherently persuasive yet manipulative qualities of visual content, compounded by users' susceptibility to unconscious biases, especially during polarising events. Therefore, we critically investigated visual audience gatekeeping in the context of the Russo–Ukrainian War, specifically focusing on a Reddit subforum devoted to Russia-related discussions. We find that visual audience gatekeeping operates within a paradigm that reflects the social reality the audience embraces. Audience gatekeepers disseminate visual information both to reproduce and defend an idealised conception of this social reality. Collectively, they produce a visual echo chamber characterised by low information diversity, which, in turn, reinforces and perpetuates the incumbent paradigm. However, heightened social tensions can trigger a paradigm shift and amplify the reproduction and defence processes, increasing the potential for the diffusion of more radical and extreme visual narratives. Based on our findings, we propose a theoretical model of visual audience gatekeeping, which has important implications for research on visuals, gatekeeping and social media platforms.
{"title":"Visual audience gatekeeping on social media platforms: A critical investigation on visual information diffusion before and during the Russo–Ukrainian War","authors":"Khalid Durani, Andreas Eckhardt, Walid Durani, Tim Kollmer, Nils Augustin","doi":"10.1111/isj.12483","DOIUrl":"10.1111/isj.12483","url":null,"abstract":"<p>Gatekeepers, including prerogative elites and institutions, possess multifaceted tools for controlling information. Historically, these gatekeepers have systematically instrumentalized visual information to shape audience perceptions in alignment with specific agendas. However, the advent of social media platforms has disrupted these power dynamics, empowering audiences through user-driven visual information exchanges. This has led to visual audience gatekeeping whereby users act as audience gatekeepers by selectively disseminating visual content, thus shaping information diffusion. While this democratisation of gatekeeping holds considerable promise for user empowerment, it also presents risks. These risks stem from the inherently persuasive yet manipulative qualities of visual content, compounded by users' susceptibility to unconscious biases, especially during polarising events. Therefore, we critically investigated visual audience gatekeeping in the context of the Russo–Ukrainian War, specifically focusing on a Reddit subforum devoted to Russia-related discussions. We find that visual audience gatekeeping operates within a paradigm that reflects the social reality the audience embraces. Audience gatekeepers disseminate visual information both to reproduce and defend an idealised conception of this social reality. Collectively, they produce a visual echo chamber characterised by low information diversity, which, in turn, reinforces and perpetuates the incumbent paradigm. However, heightened social tensions can trigger a paradigm shift and amplify the reproduction and defence processes, increasing the potential for the diffusion of more radical and extreme visual narratives. Based on our findings, we propose a theoretical model of visual audience gatekeeping, which has important implications for research on visuals, gatekeeping and social media platforms.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"415-468"},"PeriodicalIF":6.4,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12483","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136233565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Journal hijacking, which refers to the attempted brand takeover of a journal by a third party, is a nascent threat confronting the information systems (IS) community, as evidenced by cybercriminals having established an online presence, masquerading as the Scandinavian Journal of Information Systems (SJIS). The SJIS hijacking damages the journal's reputation, leads to payment and publication scams, involves identity theft among unsuspecting IS researchers, and results in tarnished author reputations. Beyond SJIS, journal hijacking presents a threat, not only to the IS community, but also to science and academic integrity in general if researchers and readers cannot distinguish between fake publications by hijacked journals and real publications by legitimate journals. In this opinion article, we relate the story of the SJIS hijacking from the victims' perspectives. We describe its many aspects, draw attention to the key factors that contribute to the problem, and offer our perspectives on different response strategies in the absence of simple solutions. We hope to create awareness about the problem and stimulate a discussion in the IS community, not least in the face of digital innovations, such as ChatGPT and other artificial intelligence technologies that may inadvertently support paper mills and the production of fake research results.
{"title":"The ‘hijacking’ of the Scandinavian Journal of Information Systems: Implications for the information systems community","authors":"Sune Dueholm Müller, Johan Ivar Sæbø","doi":"10.1111/isj.12481","DOIUrl":"10.1111/isj.12481","url":null,"abstract":"<p>Journal hijacking, which refers to the attempted brand takeover of a journal by a third party, is a nascent threat confronting the information systems (IS) community, as evidenced by cybercriminals having established an online presence, masquerading as the <i>Scandinavian Journal of Information Systems</i> (<i>SJIS</i>). The <i>SJIS</i> hijacking damages the journal's reputation, leads to payment and publication scams, involves identity theft among unsuspecting IS researchers, and results in tarnished author reputations. Beyond <i>SJIS</i>, journal hijacking presents a threat, not only to the IS community, but also to science and academic integrity in general if researchers and readers cannot distinguish between fake publications by hijacked journals and real publications by legitimate journals. In this opinion article, we relate the story of the <i>SJIS</i> hijacking from the victims' perspectives. We describe its many aspects, draw attention to the key factors that contribute to the problem, and offer our perspectives on different response strategies in the absence of simple solutions. We hope to create awareness about the problem and stimulate a discussion in the IS community, not least in the face of digital innovations, such as ChatGPT and other artificial intelligence technologies that may inadvertently support paper mills and the production of fake research results.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"364-383"},"PeriodicalIF":6.4,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12481","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135778626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
<p>The ethical values of researchers and the ethical expectations of academic publishers are a permanent feature of our scholarly debates. Meet-the-editor sessions at conferences often touch on a variety of ethical issues, while premier journals publish both special issues and opinion pieces on ethics-related topics. For instance, in a recent issue of the ISJ, Davison et al. (<span>2022</span>) wrote about some of the ethical issues facing action researchers. Indeed, readers with excellent memories may recall that, 20 years ago, a series of articles were published in the Communications of the AIS that later led to the development of a code of research conduct for the AIS.1</p><p>The current editorial is the first of several planned in which we examine specific aspects of ethics in IS research. Our writing of the editorial was stimulated by our encounters with ethical issues as experienced in our editorial roles at the ISJ and other journals. The focus of this editorial is ‘ethics and the researcher’. We do not intend to rehash the entire oeuvre of the topic, as this is extensive: the AIS e-Library indicates 516 items published in Communications of the AIS alone. Indeed, the AIS Code of Research Conduct is quite comprehensive in its coverage. Instead, we explore a few less well-appreciated areas of ethics that we suggest researchers should be aware of. These issues include obtaining human ethics research approval prior to empirical data collection, claiming research outcomes as a panacea, and being transparent in research reporting.</p><p>It is widely accepted that human research ethics approval should be obtained before data is collected from living people. Usually, such approvals are handled at the institutional level, though it is fair to point out that not all institutions require such approvals. Authors cannot be faulted for failing to secure human research ethics approval if their institution does not require it and if local legislation does not protect the privacy of human subjects. However, in these circumstances authors are required to provide details documenting their ethical conduct while collecting data from human subjects. For instance, they should provide details about whether they were transparent in disclosing research goals and risks with participants, along with explaining how they ensured anonymity, when applicable.</p><p>In addition, there may be misunderstandings about the types of data that are subject to these approvals. For instance, should publicly accessible data be subject to such reviews, where the data subjects cannot be reasonably contacted so as to obtain their consent to have that data included in the research? A key issue is whether the data can lead to positive identification (or reidentification) of an individual, and if identification was achieved, what harm or consequence might befall the individual? Research on online communities or relying on crowdsourced data, for example, those gathered from Amazon Mechanic
{"title":"Ethics I: Authors and their research","authors":"Robert M. Davison, Sutirtha Chatterjee","doi":"10.1111/isj.12480","DOIUrl":"10.1111/isj.12480","url":null,"abstract":"<p>The ethical values of researchers and the ethical expectations of academic publishers are a permanent feature of our scholarly debates. Meet-the-editor sessions at conferences often touch on a variety of ethical issues, while premier journals publish both special issues and opinion pieces on ethics-related topics. For instance, in a recent issue of the ISJ, Davison et al. (<span>2022</span>) wrote about some of the ethical issues facing action researchers. Indeed, readers with excellent memories may recall that, 20 years ago, a series of articles were published in the Communications of the AIS that later led to the development of a code of research conduct for the AIS.1</p><p>The current editorial is the first of several planned in which we examine specific aspects of ethics in IS research. Our writing of the editorial was stimulated by our encounters with ethical issues as experienced in our editorial roles at the ISJ and other journals. The focus of this editorial is ‘ethics and the researcher’. We do not intend to rehash the entire oeuvre of the topic, as this is extensive: the AIS e-Library indicates 516 items published in Communications of the AIS alone. Indeed, the AIS Code of Research Conduct is quite comprehensive in its coverage. Instead, we explore a few less well-appreciated areas of ethics that we suggest researchers should be aware of. These issues include obtaining human ethics research approval prior to empirical data collection, claiming research outcomes as a panacea, and being transparent in research reporting.</p><p>It is widely accepted that human research ethics approval should be obtained before data is collected from living people. Usually, such approvals are handled at the institutional level, though it is fair to point out that not all institutions require such approvals. Authors cannot be faulted for failing to secure human research ethics approval if their institution does not require it and if local legislation does not protect the privacy of human subjects. However, in these circumstances authors are required to provide details documenting their ethical conduct while collecting data from human subjects. For instance, they should provide details about whether they were transparent in disclosing research goals and risks with participants, along with explaining how they ensured anonymity, when applicable.</p><p>In addition, there may be misunderstandings about the types of data that are subject to these approvals. For instance, should publicly accessible data be subject to such reviews, where the data subjects cannot be reasonably contacted so as to obtain their consent to have that data included in the research? A key issue is whether the data can lead to positive identification (or reidentification) of an individual, and if identification was achieved, what harm or consequence might befall the individual? Research on online communities or relying on crowdsourced data, for example, those gathered from Amazon Mechanic","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 1","pages":"1-5"},"PeriodicalIF":6.4,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12480","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135993462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social factors play a critical role in motivating player participation and commitment to online multiplayer games. Many popular mobile massively multiplayer online games (MMOGs) adopt social network embeddedness (SNE) functions to optimise players' social play experience. SNE changes the traditional pattern of MMOG social play by porting acquaintance relationships (e.g., Facebook friends) from social networking sites to the virtual game world. However, little understanding exists on how SNE impacts mobile MMOG players' game participation results such as play performance and play frequency. Drawing on the affordance framework and social capital literature, this research proposes a theoretical model that integrates the factors of SNE technology affordance (identity transparency and information transparency), players' social experience (social interaction, social support, shared vision, and social pressure), plus affordance effects (play performance and play frequency). The model was validated through a longitudinal field study, in which both subjective and objective data were collected from Game for Peace players. Our findings indicate that identity transparency and information transparency positively correlate with social interaction, social support, shared vision, and social pressure, which, taken together, significantly affect play frequency. The results also show that social interaction and shared vision positively impact players' play performance. The study enhances the theoretical understanding of social relationships in players' game participation results from the SNE aspect. Finally, we lend insights on how game operators can improve player game experience and stickiness.
{"title":"The impact of social network embeddedness on mobile massively multiplayer online games play","authors":"Mingchuan Gong, Christian Wagner, Ahsan Ali","doi":"10.1111/isj.12479","DOIUrl":"10.1111/isj.12479","url":null,"abstract":"<p>Social factors play a critical role in motivating player participation and commitment to online multiplayer games. Many popular mobile massively multiplayer online games (MMOGs) adopt social network embeddedness (SNE) functions to optimise players' social play experience. SNE changes the traditional pattern of MMOG social play by porting acquaintance relationships (e.g., Facebook friends) from social networking sites to the virtual game world. However, little understanding exists on how SNE impacts mobile MMOG players' game participation results such as play performance and play frequency. Drawing on the affordance framework and social capital literature, this research proposes a theoretical model that integrates the factors of SNE technology affordance (identity transparency and information transparency), players' social experience (social interaction, social support, shared vision, and social pressure), plus affordance effects (play performance and play frequency). The model was validated through a longitudinal field study, in which both subjective and objective data were collected from Game for Peace players. Our findings indicate that identity transparency and information transparency positively correlate with social interaction, social support, shared vision, and social pressure, which, taken together, significantly affect play frequency. The results also show that social interaction and shared vision positively impact players' play performance. The study enhances the theoretical understanding of social relationships in players' game participation results from the SNE aspect. Finally, we lend insights on how game operators can improve player game experience and stickiness.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"327-363"},"PeriodicalIF":6.4,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136034228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marjolein A. G. van Offenbeek, Janita F. J. Vos, Bart van den Hooff, Albert Boonstra
This paper contributes to the IS misfits and workarounds literature by demonstrating how “work system–technology” misfits and workarounds can be mutually related. In the context of electronic health record (EHR) systems, this study examines when misfits experienced between an EHR system and health professionals' work practices lead to workarounds with negative consequences in terms of aggravating misfits. Our qualitative study was conducted in two tertiary hospitals in The Netherlands that had implemented an off-the-shelf EHR system. We analysed the “misfit experience → response → consequence” sequences that emerged from interviews complemented with observations and documents. Experienced misfits between the EHR and other work system components induced highly varied responses, among which workarounds. While workarounds can be beneficial, we found occasions where workarounds resulted in aggravated misfits. We conceptualise three underlying misfit-aggravating EHR-use patterns emerging from (1) a non-routine practice's perceived exceptionality, (2) collective separatism in incompatible routine practices, and (3) individual deviancy in routine work practices. These patterns differ in terms of the work practices' routineness, professionals' misfit experiences, and in how this combination provokes an individual or collective workaround that is non-compliant with both the designed technology use and the organisational intent. To understand how these patterns emerge, we discuss the interplay among work practice routineness, misfit characteristics, and non-compliant workaround behaviours.
{"title":"When workarounds aggravate misfits in the use of electronic health record systems","authors":"Marjolein A. G. van Offenbeek, Janita F. J. Vos, Bart van den Hooff, Albert Boonstra","doi":"10.1111/isj.12478","DOIUrl":"10.1111/isj.12478","url":null,"abstract":"<p>This paper contributes to the IS misfits and workarounds literature by demonstrating how “work system–technology” misfits and workarounds can be mutually related. In the context of electronic health record (EHR) systems, this study examines when misfits experienced between an EHR system and health professionals' work practices lead to workarounds with negative consequences in terms of aggravating misfits. Our qualitative study was conducted in two tertiary hospitals in The Netherlands that had implemented an off-the-shelf EHR system. We analysed the “misfit experience → response → consequence” sequences that emerged from interviews complemented with observations and documents. Experienced misfits between the EHR and other work system components induced highly varied responses, among which workarounds. While workarounds can be beneficial, we found occasions where workarounds resulted in aggravated misfits. We conceptualise three underlying misfit-aggravating EHR-use patterns emerging from (1) a non-routine practice's perceived exceptionality, (2) collective separatism in incompatible routine practices, and (3) individual deviancy in routine work practices. These patterns differ in terms of the work practices' routineness, professionals' misfit experiences, and in how this combination provokes an individual or collective workaround that is non-compliant with both the designed technology use and the organisational intent. To understand how these patterns emerge, we discuss the interplay among work practice routineness, misfit characteristics, and non-compliant workaround behaviours.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"293-326"},"PeriodicalIF":6.4,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12478","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135858624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shalini Chandra, Shirish C. Srivastava, Damien Joseph
Given the high employee turnover rates among information technology (IT) professionals, firms are on the lookout for ways to retain them. With this end in view, to keep their professionals committed and satisfied, many IT firms are making proactive efforts to induce a favourable organisational environment by encouraging employees towards extra-role organizational citizenship behaviors (OCBs). However, there is scant evidence as to whether orchestrating proactively induced OCB results in positive work attitudes. Our study contributes by theorising the mechanisms through which OCB fosters positive work attitudes among IT professionals, which is expected to lower their turnover rates. Grounding our research in self-perception and self-determination theories, we hypothesize the relationships between IT professionals' OCB and their affective attitudes towards their organisation and job, as being mediated by their cognitive evaluations of the ‘meaning of their IT work’. We test the theorised model with data collected through a large-scale two-wave survey design from a multinational IT-services company. The results offer a nuanced understanding of the relationship between OCB and positive work attitudes for IT professionals, which have significant implications for research and practice.
{"title":"Can proactively induced organisational citizenship behaviour (OCB) foster positive work attitudes? Theorising the mediating role of ‘meaning of work’ for IT professionals","authors":"Shalini Chandra, Shirish C. Srivastava, Damien Joseph","doi":"10.1111/isj.12473","DOIUrl":"10.1111/isj.12473","url":null,"abstract":"<p>Given the high employee turnover rates among information technology (IT) professionals, firms are on the lookout for ways to retain them. With this end in view, to keep their professionals committed and satisfied, many IT firms are making proactive efforts to induce a favourable organisational environment by encouraging employees towards extra-role organizational citizenship behaviors (OCBs). However, there is scant evidence as to whether orchestrating proactively induced OCB results in positive work attitudes. Our study contributes by theorising the mechanisms through which OCB fosters positive work attitudes among IT professionals, which is expected to lower their turnover rates. Grounding our research in self-perception and self-determination theories, we hypothesize the relationships between IT professionals' OCB and their affective attitudes towards their organisation and job, as being mediated by their cognitive evaluations of the ‘meaning of their IT work’. We test the theorised model with data collected through a large-scale two-wave survey design from a multinational IT-services company. The results offer a nuanced understanding of the relationship between OCB and positive work attitudes for IT professionals, which have significant implications for research and practice.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 1","pages":"125-178"},"PeriodicalIF":6.4,"publicationDate":"2023-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135147259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}