首页 > 最新文献

Information Systems Journal最新文献

英文 中文
An empirical investigation of social comparison and open source community health 社会比较与开源社区健康的实证调查
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-11-15 DOI: 10.1111/isj.12485
Kevin Lumbard, Matt Germonprez, Sean Goggins

It is well known that corporations rely on open source software as part of their product development lifecycle. Given these commitments, understanding the health of open source communities is a central concern in today's business setting. Our research uses social comparison theory as a framework for understanding how open source communities consider community health beyond any single metric within any single open source community—including a broader view of how others are using these health indicators in practice. Using methods from engaged field research, including 38 interviews, we examine practices of social comparison as an advancement in understanding open source community health—and subsequently engagement with open source communities. The results of this study show that open source community health is not a single set of discrete metrics but is an ongoing social construction. Through our study, we advance theoretical and applied knowledge regarding issues of open source community health, open source community engagement, and social comparison.

众所周知,企业依赖开源软件作为其产品开发生命周期的一部分。鉴于这些承诺,了解开源社区的健康状况是当今商业环境的核心问题。我们的研究以社会比较理论为框架,了解开源社区是如何考虑社区健康的,而不是单一开源社区内的任何单一指标--包括更广泛地了解其他社区是如何在实践中使用这些健康指标的。利用参与式实地研究(包括 38 次访谈)的方法,我们研究了社会比较的实践,将其作为理解开源社区健康--以及随后参与开源社区--的一个进步。这项研究的结果表明,开源社区的健康并不是一套单一的离散指标,而是一种持续的社会建构。通过我们的研究,我们推进了有关开源社区健康、开源社区参与和社会比较等问题的理论和应用知识。
{"title":"An empirical investigation of social comparison and open source community health","authors":"Kevin Lumbard,&nbsp;Matt Germonprez,&nbsp;Sean Goggins","doi":"10.1111/isj.12485","DOIUrl":"10.1111/isj.12485","url":null,"abstract":"<p>It is well known that corporations rely on open source software as part of their product development lifecycle. Given these commitments, understanding the health of open source communities is a central concern in today's business setting. Our research uses social comparison theory as a framework for understanding how open source communities consider community health beyond any single metric within any single open source community—including a broader view of how others are using these health indicators in practice. Using methods from engaged field research, including 38 interviews, we examine practices of social comparison as an advancement in understanding open source community health—and subsequently engagement with open source communities. The results of this study show that open source community health is not a single set of discrete metrics but is an ongoing social construction. Through our study, we advance theoretical and applied knowledge regarding issues of open source community health, open source community engagement, and social comparison.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"499-532"},"PeriodicalIF":6.4,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139274666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accountability mobilization, guanxi and social media-induced polarization: Understanding the bystander's prosocial punishment to misinformation spreader 责任动员、关系和社交媒体引发的两极分化:理解旁观者对错误信息传播者的亲社会惩罚
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-11-12 DOI: 10.1111/isj.12486
Zhe Zhu, Nan Zhang, Meiwen Ding, Lei Chen

Prosocial punishments by social media bystanders could block the path from misinformation spread to social media-induced polarization (SMIP). However, prosocial punishments are inadequate for SMIP management because of the personal costs, and few studies propose effective ways to mobilize bystanders. The Chinese government implemented a regulation in 2017 to mobilize bystanders on social media through allocating accountability to act as misinformation supervisors. In China's guanxi culture, prosocial punishments are less observed considering the additional personal costs caused by breaking guanxi. Therefore, assessing the effectiveness of China's cyberspace accountability mobilization can help identify an effective tool for other governments to mitigate SMIP. We used a vignette survey experiment to collect data from WeChat users and applied a random regression model to analyse the data. Accountability mobilization significantly promotes bystanders' prosocial punishment to block the misinformation-spread-to-SMIP path. Guanxi negatively moderates the relationship between accountability mobilization and prosocial punishment to the above path. The government could encourage the public to actively take prosocial punishments by using the new tool of accountability mobilization. Guanxi culture reduces the effectiveness of the tool.

社交媒体旁观者的亲社会惩罚可以阻断从错误信息传播到社交媒体引发的两极分化(SMIP)的路径。然而,由于个人成本的原因,亲社会的惩罚不足以管理SMIP,也很少有研究提出动员旁观者的有效方法。中国政府在 2017 年实施了一项规定,通过分配责任制来动员社交媒体上的旁观者充当不实信息的监督者。在中国的 "关公文化 "中,考虑到破坏 "关公 "所带来的额外个人成本,亲社会惩罚较少被遵守。因此,评估中国网络空间问责动员的有效性,有助于为其他国家政府找到缓解 SMIP 的有效工具。我们采用小故事调查实验收集微信用户的数据,并运用随机回归模型对数据进行分析。责任动员极大地促进了旁观者的亲社会惩罚,从而阻断了错误信息传播到 SMIP 的路径。关西负向调节了问责动员和亲社会惩罚与上述路径的关系。政府可以通过问责动员这一新工具鼓励公众积极采取亲社会惩罚。关西文化降低了这一工具的有效性。
{"title":"Accountability mobilization, guanxi and social media-induced polarization: Understanding the bystander's prosocial punishment to misinformation spreader","authors":"Zhe Zhu,&nbsp;Nan Zhang,&nbsp;Meiwen Ding,&nbsp;Lei Chen","doi":"10.1111/isj.12486","DOIUrl":"10.1111/isj.12486","url":null,"abstract":"<p>Prosocial punishments by social media bystanders could block the path from misinformation spread to social media-induced polarization (SMIP). However, prosocial punishments are inadequate for SMIP management because of the personal costs, and few studies propose effective ways to mobilize bystanders. The Chinese government implemented a regulation in 2017 to mobilize bystanders on social media through allocating accountability to act as misinformation supervisors. In China's guanxi culture, prosocial punishments are less observed considering the additional personal costs caused by breaking guanxi. Therefore, assessing the effectiveness of China's cyberspace accountability mobilization can help identify an effective tool for other governments to mitigate SMIP. We used a vignette survey experiment to collect data from WeChat users and applied a random regression model to analyse the data. Accountability mobilization significantly promotes bystanders' prosocial punishment to block the misinformation-spread-to-SMIP path. Guanxi negatively moderates the relationship between accountability mobilization and prosocial punishment to the above path. The government could encourage the public to actively take prosocial punishments by using the new tool of accountability mobilization. Guanxi culture reduces the effectiveness of the tool.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"1116-1143"},"PeriodicalIF":6.4,"publicationDate":"2023-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135038492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contextualising collective efficacy in virtual team research: The essential role of collaborative technologies in the virtual team efficacy conceptual framework 虚拟团队研究中的集体效能内涵:协作技术在虚拟团队效能概念框架中的重要作用
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-11-07 DOI: 10.1111/isj.12484
Andrew Hardin, Robert M. Davison, Christoph Schneider, Clayton A. Looney, Suprateek Sarker

One factor receiving contemporary interest from virtual team researchers is collective-level efficacy, that is, a team's shared belief in its collective abilities to work effectively. However, our understanding of this literature leads to two concerns. First, depending on traditional team-focused collective-level efficacy concepts conveys an indifferent view of technology that ignores decades of research explaining how virtual teams' reliance on collaborative technologies differentiates them from traditional teams. Second, the information systems literature has largely ignored the concept of collective-level efficacy in virtual team research. That collective-level efficacy is underexamined in IS research is disappointing, given the growing recognition (outside the IS literature) that it is crucial to virtual team success. This absence becomes even more concerning given that IS researchers developed the concept of virtual team efficacy (VTE) specifically for virtual team settings. Unlike collective-level efficacy measures designed for traditional team settings, VTE incorporates technology into its conceptual definition and the operationalization of its measurement indicators. Thus, it is a stronger predictor of virtual team outcomes. To demonstrate its importance to IS research, we used a deductive theory-driven approach to propose and empirically evaluate whether VTE indirectly acts on virtual team effectiveness through the critical concepts of trust and participants' perceptions of problems associated with the collaboration inhibitors of time difference, geographical separation, and cultural differences. This research contributes significantly to the literature by confirming VTE's relationship to important virtual team success factors and informing IS researchers about the appropriate choice of constructs when studying collective-level efficacy in virtual team settings.

当代虚拟团队研究人员关注的一个因素是集体层面的效能,即团队对其有效工作的集体能力的共同信念。然而,我们对这一文献的理解导致了两个问题。首先,依赖于传统的以团队为中心的集体效能概念传达了一种对技术漠不关心的观点,忽略了数十年来解释虚拟团队对协作技术的依赖如何使其有别于传统团队的研究。其次,信息系统文献在很大程度上忽视了虚拟团队研究中的集体效能概念。鉴于越来越多的人(在信息系统文献之外)认识到,集体层面的效能对于虚拟团队的成功至关重要,因此信息系统研究中对集体层面效能的研究不足令人失望。鉴于 IS 研究人员专门针对虚拟团队环境提出了虚拟团队效能(VTE)的概念,这种缺失就更加令人担忧了。与为传统团队环境设计的集体层面效能测量不同,VTE 将技术纳入其概念定义和测量指标的操作中。因此,它更能预测虚拟团队的成果。为了证明 VTE 对 IS 研究的重要性,我们采用了一种演绎理论驱动的方法,提出并实证评估了 VTE 是否通过信任和参与者对与时差、地理分离和文化差异等合作抑制因素相关的问题的感知等关键概念间接影响虚拟团队的效能。这项研究证实了 VTE 与重要的虚拟团队成功因素之间的关系,并告知信息系统研究人员在研究虚拟团队环境中的集体效能时应如何选择适当的建构。
{"title":"Contextualising collective efficacy in virtual team research: The essential role of collaborative technologies in the virtual team efficacy conceptual framework","authors":"Andrew Hardin,&nbsp;Robert M. Davison,&nbsp;Christoph Schneider,&nbsp;Clayton A. Looney,&nbsp;Suprateek Sarker","doi":"10.1111/isj.12484","DOIUrl":"10.1111/isj.12484","url":null,"abstract":"<p>One factor receiving contemporary interest from virtual team researchers is collective-level efficacy, that is, a team's shared belief in its collective abilities to work effectively. However, our understanding of this literature leads to two concerns. First, depending on traditional team-focused collective-level efficacy concepts conveys an indifferent view of technology that ignores decades of research explaining how virtual teams' reliance on collaborative technologies differentiates them from traditional teams. Second, the information systems literature has largely ignored the concept of collective-level efficacy in virtual team research. That collective-level efficacy is underexamined in IS research is disappointing, given the growing recognition (outside the IS literature) that it is crucial to virtual team success. This absence becomes even more concerning given that IS researchers developed the concept of virtual team efficacy (VTE) specifically for virtual team settings. Unlike collective-level efficacy measures designed for traditional team settings, VTE incorporates technology into its conceptual definition and the operationalization of its measurement indicators. Thus, it is a stronger predictor of virtual team outcomes. To demonstrate its importance to IS research, we used a deductive theory-driven approach to propose and empirically evaluate whether VTE indirectly acts on virtual team effectiveness through the critical concepts of trust and participants' perceptions of problems associated with the collaboration inhibitors of time difference, geographical separation, and cultural differences. This research contributes significantly to the literature by confirming VTE's relationship to important virtual team success factors and informing IS researchers about the appropriate choice of constructs when studying collective-level efficacy in virtual team settings.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"469-498"},"PeriodicalIF":6.4,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135540050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agentic interplay between hybridity and liminality in contemporary boundary work 当代边界作品中混杂性与边缘性之间的代理相互作用
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-10-31 DOI: 10.1111/isj.12477
Petros Chamakiotis, Gillian Symon, Rebecca Whiting

There is no doubt that digital technologies have an impact on boundary work, that is, the practices individuals develop to work up boundaries between ‘work’ and ‘life’. However, related research is still dominated by the integration–segmentation framework which may restrict our understanding of contemporary practice. To address this limitation, we use the concepts of hybridity (fusion) and liminality (in-betweenness) in combination to explore how their interplay may promote more nuanced accounts of how individuals work up their boundaries in contemporary everyday life. Our analysis of video diaries and follow-up interviews undertaken by 30 UK-based workers reveals an ‘agentic interplay’ of hybridity and liminality that is understood as an ongoing dynamic practice, sometimes enabling and sometimes undermining desired boundary work outcomes. We make three contributions, collectively offering a critical advancement in the work–life debate and the hybridity and liminality literatures: (a) further developing an understanding of boundary work as situated, creative and dynamic; (b) unpacking the agentic potential of the ‘black box’ of the hybridity–liminality interplay; and (c) expanding current understandings and applications of the concepts of hybridity and liminality.

毫无疑问,数字技术对边界工作产生了影响,也就是说,个人在“工作”和“生活”之间建立界限的做法。然而,相关研究仍以整合-分割框架为主,这可能会限制我们对当代实践的理解。为了解决这一限制,我们将混合性(融合)和阈限性(中间性)的概念结合起来,探索它们的相互作用如何促进对个人如何在当代日常生活中建立边界的更细致的描述。我们对30名英国员工的视频日记和后续采访进行了分析,揭示了混合性和阈限性的“代理相互作用”,这种相互作用被理解为一种持续的动态实践,有时能够实现,有时会破坏预期的边界工作结果。我们做出了三个贡献,共同为工作-生活辩论和混杂性和阈限性文献提供了关键的进步:(a)进一步发展对边界工作的理解,将其视为情境、创造性和动态的;(b)解开混杂性-有限性相互作用的“黑盒子”的代理潜力;(c)扩展当前对混杂性和阈限性概念的理解和应用。
{"title":"Agentic interplay between hybridity and liminality in contemporary boundary work","authors":"Petros Chamakiotis,&nbsp;Gillian Symon,&nbsp;Rebecca Whiting","doi":"10.1111/isj.12477","DOIUrl":"10.1111/isj.12477","url":null,"abstract":"<p>There is no doubt that digital technologies have an impact on boundary work, that is, the practices individuals develop to work up boundaries between ‘work’ and ‘life’. However, related research is still dominated by the integration–segmentation framework which may restrict our understanding of contemporary practice. To address this limitation, we use the concepts of hybridity (fusion) and liminality (in-betweenness) in combination to explore how their interplay may promote more nuanced accounts of how individuals work up their boundaries in contemporary everyday life. Our analysis of video diaries and follow-up interviews undertaken by 30 UK-based workers reveals an ‘agentic interplay’ of hybridity and liminality that is understood as an ongoing dynamic practice, sometimes <i>enabling</i> and sometimes <i>undermining</i> desired boundary work outcomes. We make three contributions, collectively offering a critical advancement in the work–life debate and the hybridity and liminality literatures: (a) further developing an understanding of boundary work as situated, creative and dynamic; (b) unpacking the agentic potential of the ‘black box’ of the hybridity–liminality interplay; and (c) expanding current understandings and applications of the concepts of hybridity and liminality.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 1","pages":"261-283"},"PeriodicalIF":6.4,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12477","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135813857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visual audience gatekeeping on social media platforms: A critical investigation on visual information diffusion before and during the Russo–Ukrainian War 社交媒体平台上的视觉受众把关:俄乌战争前和战争期间视觉信息传播的批判性研究
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-10-28 DOI: 10.1111/isj.12483
Khalid Durani, Andreas Eckhardt, Walid Durani, Tim Kollmer, Nils Augustin

Gatekeepers, including prerogative elites and institutions, possess multifaceted tools for controlling information. Historically, these gatekeepers have systematically instrumentalized visual information to shape audience perceptions in alignment with specific agendas. However, the advent of social media platforms has disrupted these power dynamics, empowering audiences through user-driven visual information exchanges. This has led to visual audience gatekeeping whereby users act as audience gatekeepers by selectively disseminating visual content, thus shaping information diffusion. While this democratisation of gatekeeping holds considerable promise for user empowerment, it also presents risks. These risks stem from the inherently persuasive yet manipulative qualities of visual content, compounded by users' susceptibility to unconscious biases, especially during polarising events. Therefore, we critically investigated visual audience gatekeeping in the context of the Russo–Ukrainian War, specifically focusing on a Reddit subforum devoted to Russia-related discussions. We find that visual audience gatekeeping operates within a paradigm that reflects the social reality the audience embraces. Audience gatekeepers disseminate visual information both to reproduce and defend an idealised conception of this social reality. Collectively, they produce a visual echo chamber characterised by low information diversity, which, in turn, reinforces and perpetuates the incumbent paradigm. However, heightened social tensions can trigger a paradigm shift and amplify the reproduction and defence processes, increasing the potential for the diffusion of more radical and extreme visual narratives. Based on our findings, we propose a theoretical model of visual audience gatekeeping, which has important implications for research on visuals, gatekeeping and social media platforms.

把关人,包括特权精英和机构,拥有多方面的信息控制工具。从历史上看,这些守门人系统地利用视觉信息来塑造受众的观念,使其与特定的议程保持一致。然而,社交媒体平台的出现打破了这些权力动态,通过用户驱动的视觉信息交流赋予受众权力。这导致了视觉受众把关,即用户通过有选择地传播视觉内容来充当受众把关人,从而影响信息传播。虽然这种把关的民主化为用户赋权带来了巨大希望,但也带来了风险。这些风险源于视觉内容固有的说服力和操纵性,再加上用户容易受到无意识偏见的影响,尤其是在两极分化的事件中。因此,我们对俄乌战争背景下的视觉受众把关进行了批判性研究,特别关注了 Reddit 专门讨论俄罗斯相关问题的子论坛。我们发现,视觉受众把关是在反映受众所接受的社会现实的范式中运作的。受众把关人传播视觉信息,既是为了再现这一社会现实,也是为了捍卫这一社会现实的理想化概念。他们共同制造了一个以信息多样性低为特点的视觉回声室,这反过来又强化和延续了现存的范式。然而,社会紧张局势的加剧可能会引发范式的转变,扩大复制和防御过程,增加更激进、更极端的视觉叙事传播的可能性。基于我们的研究结果,我们提出了视觉受众把关的理论模型,这对视觉、把关和社交媒体平台的研究具有重要意义。
{"title":"Visual audience gatekeeping on social media platforms: A critical investigation on visual information diffusion before and during the Russo–Ukrainian War","authors":"Khalid Durani,&nbsp;Andreas Eckhardt,&nbsp;Walid Durani,&nbsp;Tim Kollmer,&nbsp;Nils Augustin","doi":"10.1111/isj.12483","DOIUrl":"10.1111/isj.12483","url":null,"abstract":"<p>Gatekeepers, including prerogative elites and institutions, possess multifaceted tools for controlling information. Historically, these gatekeepers have systematically instrumentalized visual information to shape audience perceptions in alignment with specific agendas. However, the advent of social media platforms has disrupted these power dynamics, empowering audiences through user-driven visual information exchanges. This has led to visual audience gatekeeping whereby users act as audience gatekeepers by selectively disseminating visual content, thus shaping information diffusion. While this democratisation of gatekeeping holds considerable promise for user empowerment, it also presents risks. These risks stem from the inherently persuasive yet manipulative qualities of visual content, compounded by users' susceptibility to unconscious biases, especially during polarising events. Therefore, we critically investigated visual audience gatekeeping in the context of the Russo–Ukrainian War, specifically focusing on a Reddit subforum devoted to Russia-related discussions. We find that visual audience gatekeeping operates within a paradigm that reflects the social reality the audience embraces. Audience gatekeepers disseminate visual information both to reproduce and defend an idealised conception of this social reality. Collectively, they produce a visual echo chamber characterised by low information diversity, which, in turn, reinforces and perpetuates the incumbent paradigm. However, heightened social tensions can trigger a paradigm shift and amplify the reproduction and defence processes, increasing the potential for the diffusion of more radical and extreme visual narratives. Based on our findings, we propose a theoretical model of visual audience gatekeeping, which has important implications for research on visuals, gatekeeping and social media platforms.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"415-468"},"PeriodicalIF":6.4,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12483","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136233565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The ‘hijacking’ of the Scandinavian Journal of Information Systems: Implications for the information systems community 斯堪的纳维亚信息系统期刊》被 "劫持":对信息系统界的影响
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-10-19 DOI: 10.1111/isj.12481
Sune Dueholm Müller, Johan Ivar Sæbø

Journal hijacking, which refers to the attempted brand takeover of a journal by a third party, is a nascent threat confronting the information systems (IS) community, as evidenced by cybercriminals having established an online presence, masquerading as the Scandinavian Journal of Information Systems (SJIS). The SJIS hijacking damages the journal's reputation, leads to payment and publication scams, involves identity theft among unsuspecting IS researchers, and results in tarnished author reputations. Beyond SJIS, journal hijacking presents a threat, not only to the IS community, but also to science and academic integrity in general if researchers and readers cannot distinguish between fake publications by hijacked journals and real publications by legitimate journals. In this opinion article, we relate the story of the SJIS hijacking from the victims' perspectives. We describe its many aspects, draw attention to the key factors that contribute to the problem, and offer our perspectives on different response strategies in the absence of simple solutions. We hope to create awareness about the problem and stimulate a discussion in the IS community, not least in the face of digital innovations, such as ChatGPT and other artificial intelligence technologies that may inadvertently support paper mills and the production of fake research results.

期刊劫持是指第三方企图接管期刊的品牌,是信息系统(IS)界面临的一种新威胁,网络犯罪分子建立了一个在线存在,伪装成《斯堪的纳维亚信息系统期刊》(SJIS)就是证明。劫持《斯堪的纳维亚信息系统学报》的行为损害了该学报的声誉,导致付款和出版诈骗,使毫无戒心的信息系统研究人员的身份遭到盗用,并使作者的声誉受损。除了期刊劫持,如果研究人员和读者无法区分被劫持期刊的虚假出版物和合法期刊的真实出版物,那么期刊劫持不仅会威胁到信息系统界,还会威胁到整个科学和学术诚信。在这篇观点文章中,我们从受害者的角度讲述了《上海国际青年期刊》被劫持的故事。我们描述了劫持事件的方方面面,提请人们注意造成这一问题的关键因素,并在缺乏简单解决方案的情况下,就不同的应对策略提出了我们的观点。我们希望能引起人们对这一问题的关注,并激发信息社会的讨论,尤其是面对数字创新,如 ChatGPT 和其他人工智能技术,它们可能会无意中支持造纸厂和虚假研究成果的生产。
{"title":"The ‘hijacking’ of the Scandinavian Journal of Information Systems: Implications for the information systems community","authors":"Sune Dueholm Müller,&nbsp;Johan Ivar Sæbø","doi":"10.1111/isj.12481","DOIUrl":"10.1111/isj.12481","url":null,"abstract":"<p>Journal hijacking, which refers to the attempted brand takeover of a journal by a third party, is a nascent threat confronting the information systems (IS) community, as evidenced by cybercriminals having established an online presence, masquerading as the <i>Scandinavian Journal of Information Systems</i> (<i>SJIS</i>). The <i>SJIS</i> hijacking damages the journal's reputation, leads to payment and publication scams, involves identity theft among unsuspecting IS researchers, and results in tarnished author reputations. Beyond <i>SJIS</i>, journal hijacking presents a threat, not only to the IS community, but also to science and academic integrity in general if researchers and readers cannot distinguish between fake publications by hijacked journals and real publications by legitimate journals. In this opinion article, we relate the story of the <i>SJIS</i> hijacking from the victims' perspectives. We describe its many aspects, draw attention to the key factors that contribute to the problem, and offer our perspectives on different response strategies in the absence of simple solutions. We hope to create awareness about the problem and stimulate a discussion in the IS community, not least in the face of digital innovations, such as ChatGPT and other artificial intelligence technologies that may inadvertently support paper mills and the production of fake research results.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"364-383"},"PeriodicalIF":6.4,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12481","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135778626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ethics I: Authors and their research 伦理 I:作者及其研究
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-10-17 DOI: 10.1111/isj.12480
Robert M. Davison, Sutirtha Chatterjee
<p>The ethical values of researchers and the ethical expectations of academic publishers are a permanent feature of our scholarly debates. Meet-the-editor sessions at conferences often touch on a variety of ethical issues, while premier journals publish both special issues and opinion pieces on ethics-related topics. For instance, in a recent issue of the ISJ, Davison et al. (<span>2022</span>) wrote about some of the ethical issues facing action researchers. Indeed, readers with excellent memories may recall that, 20 years ago, a series of articles were published in the Communications of the AIS that later led to the development of a code of research conduct for the AIS.1</p><p>The current editorial is the first of several planned in which we examine specific aspects of ethics in IS research. Our writing of the editorial was stimulated by our encounters with ethical issues as experienced in our editorial roles at the ISJ and other journals. The focus of this editorial is ‘ethics and the researcher’. We do not intend to rehash the entire oeuvre of the topic, as this is extensive: the AIS e-Library indicates 516 items published in Communications of the AIS alone. Indeed, the AIS Code of Research Conduct is quite comprehensive in its coverage. Instead, we explore a few less well-appreciated areas of ethics that we suggest researchers should be aware of. These issues include obtaining human ethics research approval prior to empirical data collection, claiming research outcomes as a panacea, and being transparent in research reporting.</p><p>It is widely accepted that human research ethics approval should be obtained before data is collected from living people. Usually, such approvals are handled at the institutional level, though it is fair to point out that not all institutions require such approvals. Authors cannot be faulted for failing to secure human research ethics approval if their institution does not require it and if local legislation does not protect the privacy of human subjects. However, in these circumstances authors are required to provide details documenting their ethical conduct while collecting data from human subjects. For instance, they should provide details about whether they were transparent in disclosing research goals and risks with participants, along with explaining how they ensured anonymity, when applicable.</p><p>In addition, there may be misunderstandings about the types of data that are subject to these approvals. For instance, should publicly accessible data be subject to such reviews, where the data subjects cannot be reasonably contacted so as to obtain their consent to have that data included in the research? A key issue is whether the data can lead to positive identification (or reidentification) of an individual, and if identification was achieved, what harm or consequence might befall the individual? Research on online communities or relying on crowdsourced data, for example, those gathered from Amazon Mechanic
研究人员的道德价值观和学术出版商的道德期望是我们学术辩论的永恒特征。会议上的编辑见面会经常涉及各种各样的伦理问题,而一流的期刊也会发表与伦理相关的专题和评论文章。例如,在最近一期的ISJ中,戴维森等人(2022)写了一些行动研究人员面临的伦理问题。事实上,记性好的读者可能还记得,20年前,《AIS通讯》上发表了一系列文章,这些文章后来导致了AIS研究行为准则的发展。1当前的社论是我们计划中的几篇社论中的第一篇,我们将研究is研究中的特定伦理方面。我们撰写这篇社论的灵感来自于我们在ISJ和其他期刊担任编辑时遇到的伦理问题。这篇社论的重点是“伦理与研究者”。我们不打算重述该主题的全部作品,因为这是广泛的:AIS电子库显示仅在AIS通讯中发表的516个项目。事实上,《科研行为准则》的内容相当全面。相反,我们探索了一些不太受欢迎的伦理领域,我们建议研究人员应该意识到这一点。这些问题包括在收集经验数据之前获得人类伦理研究批准,声称研究结果是灵丹妙药,以及在研究报告中保持透明。人们普遍认为,在从活人身上收集数据之前,应该获得人类研究伦理的批准。通常,这类审批是在机构层面进行的,不过公平地说,并非所有机构都需要这样的审批。如果他们的机构不要求获得人类研究伦理批准,如果当地立法不保护人类受试者的隐私,那么作者不能因为未能获得批准而受到指责。然而,在这些情况下,作者需要提供详细的记录他们在收集人类受试者数据时的道德行为。例如,他们应该提供细节,说明他们在向参与者披露研究目标和风险方面是否透明,同时解释他们如何在适用的情况下确保匿名。此外,可能存在对受这些批准约束的数据类型的误解。例如,在未能合理联系资料当事人以取得他们同意将该等资料纳入研究的情况下,公众可查阅的资料应否须接受该等审查?关键问题是数据是否可以导致对个人的正面识别(或重新识别),如果实现了识别,个人可能会受到什么伤害或后果?对在线社区的研究或依赖众包数据(例如,从亚马逊土耳其机器人(MTurk)收集的数据)也存在问题。即使这些众包数据主体无法被识别,我们也可以询问他们的时间是否得到了公平的报酬。在许多研究中,尤其是案例研究和行动研究,以及在组织内部进行的调查,人类研究伦理的批准通常是由一名高级经理代表下属获得的。这并不一定是理想的,事实上,下属可能在本质上是被迫参与的。因此,接近100%的回复率应该会引起审稿人的注意。行动研究尤其复杂,因为该组织本身就是希望从研究中受益的客户。可能是员工的知情同意得到了实现,也就是说,他们被告知他们的数据将被收集,但更严格的肯定同意标准,即每个员工自由和积极地肯定个人愿意参与研究,往往从未寻求过,更不用说实现了。不管我们谈论的是小数据还是大数据,如果数据是由人类受试者产生的,研究人员需要问自己,操纵这些数据并发表从数据中得出的推论是否会伤害到人们。学术期刊开始关注这些问题,认识到研究伦理批准可能是捏造的(或根本没有获得批准)。期刊越来越期望作者在保护研究对象的数据隐私权方面保持透明,无论研究数据的收集适用于哪个司法管辖区。至少,我们期望审稿人应该调查在研究设计中是否对伦理问题给予了应有的关注,并质疑伦理问题报告的方式是否存在不一致,或者研究实践是否明确且在伦理上可辩护。 研究人员的道德价值观和学术出版商的道德期望是我们学术辩论的永恒特征。会议上的编辑见面会经常涉及各种各样的伦理问题,而一流的期刊也会发表与伦理相关的专题和评论文章。例如,在最近一期的ISJ中,戴维森等人(2022)写了一些行动研究人员面临的伦理问题。事实上,记性好的读者可能还记得,20年前,《AIS通讯》上发表了一系列文章,这些文章后来导致了AIS研究行为准则的发展。目前的这篇社论是我们计划中的几篇社论中的第一篇,其中我们将研究is研究中的特定伦理方面。我们撰写这篇社论的灵感来自于我们在ISJ和其他期刊担任编辑时遇到的伦理问题。这篇社论的重点是“伦理与研究者”。我们不打算重述该主题的全部作品,因为这是广泛的:AIS电子库显示仅在AIS通讯中发表的516个项目。事实上,《科研行为准则》的内容相当全面。相反,我们探索了一些不太受欢迎的伦理领域,我们建议研究人员应该意识到这一点。这些问题包括在收集经验数据之前获得人类伦理研究批准,声称研究结果是灵丹妙药,以及在研究报告中保持透明。人们普遍认为,在从活人身上收集数据之前,应该获得人类研究伦理的批准。通常,这类审批是在机构层面进行的,不过公平地说,并非所有机构都需要这样的审批。如果他们的机构不要求获得人类研究伦理批准,如果当地立法不保护人类受试者的隐私,那么作者不能因为未能获得批准而受到指责。然而,在这些情况下,作者需要提供详细的记录他们在收集人类受试者数据时的道德行为。例如,他们应该提供细节,说明他们在向参与者披露研究目标和风险方面是否透明,同时解释他们如何在适用的情况下确保匿名。此外,可能存在对受这些批准约束的数据类型的误解。例如,在未能合理联系资料当事人以取得他们同意将该等资料纳入研究的情况下,公众可查阅的资料应否须接受该等审查?关键问题是数据是否可以导致对个人的正面识别(或重新识别),如果实现了识别,个人可能会受到什么伤害或后果?对在线社区的研究或依赖众包数据(例如,从亚马逊土耳其机器人(MTurk)收集的数据)也存在问题。即使这些众包数据主体无法被识别,我们也可以询问他们的时间是否得到了公平的报酬。在许多研究中,尤其是案例研究和行动研究,以及在组织内部进行的调查,人类研究伦理的批准通常是由一名高级经理代表下属获得的。这并不一定是理想的,事实上,下属可能在本质上是被迫参与的。因此,接近100%的回复率应该会引起审稿人的注意。行动研究尤其复杂,因为该组织本身就是希望从研究中受益的客户。可能是员工的知情同意得到了实现,也就是说,他们被告知他们的数据将被收集,但更严格的肯定同意标准,即每个员工自由和积极地肯定个人愿意参与研究,往往从未寻求过,更不用说实现了。不管我们谈论的是小数据还是大数据,如果数据是由人类受试者产生的,研究人员需要问自己,操纵这些数据并发表从数据中得出的推论是否会伤害到人们。学术期刊开始关注这些问题,认识到研究伦理批准可能是捏造的(或根本没有获得批准)。期刊越来越期望作者在保护研究对象的数据隐私权方面保持透明,无论研究数据的收集适用于哪个司法管辖区。至少,我们期望审稿人应该调查在研究设计中是否对伦理问题给予了应有的关注,并质疑伦理问题报告的方式是否存在不一致,或者研究实践是否明确且在伦理上可辩护。 与作者有关的第二个伦理问题涉及我们所谓的技术解决方案主义,即研究确定地提供解决方案(针对真实或想象的问题),而不进行任何批判性反思或尝试测试解决方案是否在实践中实际起作用。例如,这样的“解决方案”可能对公司利益相关者有利,但对员工严重不利。边缘化和少数群体也可能受到技术确定性解决方案的影响。正如Díaz Andrade和Techatassanasoontorn(2021)所指出的那样,电子银行技术对那些喜欢使用它的人来说是很好的,但是当银行关闭农村分行并强制采用该技术时,那些受到数字挑战或不想上网进行银行业务的人就会陷入困境。研究人员需要注意他们的研究的更广泛的影响和后果,认识到技术叙述的局
{"title":"Ethics I: Authors and their research","authors":"Robert M. Davison,&nbsp;Sutirtha Chatterjee","doi":"10.1111/isj.12480","DOIUrl":"10.1111/isj.12480","url":null,"abstract":"&lt;p&gt;The ethical values of researchers and the ethical expectations of academic publishers are a permanent feature of our scholarly debates. Meet-the-editor sessions at conferences often touch on a variety of ethical issues, while premier journals publish both special issues and opinion pieces on ethics-related topics. For instance, in a recent issue of the ISJ, Davison et al. (&lt;span&gt;2022&lt;/span&gt;) wrote about some of the ethical issues facing action researchers. Indeed, readers with excellent memories may recall that, 20 years ago, a series of articles were published in the Communications of the AIS that later led to the development of a code of research conduct for the AIS.1&lt;/p&gt;&lt;p&gt;The current editorial is the first of several planned in which we examine specific aspects of ethics in IS research. Our writing of the editorial was stimulated by our encounters with ethical issues as experienced in our editorial roles at the ISJ and other journals. The focus of this editorial is ‘ethics and the researcher’. We do not intend to rehash the entire oeuvre of the topic, as this is extensive: the AIS e-Library indicates 516 items published in Communications of the AIS alone. Indeed, the AIS Code of Research Conduct is quite comprehensive in its coverage. Instead, we explore a few less well-appreciated areas of ethics that we suggest researchers should be aware of. These issues include obtaining human ethics research approval prior to empirical data collection, claiming research outcomes as a panacea, and being transparent in research reporting.&lt;/p&gt;&lt;p&gt;It is widely accepted that human research ethics approval should be obtained before data is collected from living people. Usually, such approvals are handled at the institutional level, though it is fair to point out that not all institutions require such approvals. Authors cannot be faulted for failing to secure human research ethics approval if their institution does not require it and if local legislation does not protect the privacy of human subjects. However, in these circumstances authors are required to provide details documenting their ethical conduct while collecting data from human subjects. For instance, they should provide details about whether they were transparent in disclosing research goals and risks with participants, along with explaining how they ensured anonymity, when applicable.&lt;/p&gt;&lt;p&gt;In addition, there may be misunderstandings about the types of data that are subject to these approvals. For instance, should publicly accessible data be subject to such reviews, where the data subjects cannot be reasonably contacted so as to obtain their consent to have that data included in the research? A key issue is whether the data can lead to positive identification (or reidentification) of an individual, and if identification was achieved, what harm or consequence might befall the individual? Research on online communities or relying on crowdsourced data, for example, those gathered from Amazon Mechanic","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 1","pages":"1-5"},"PeriodicalIF":6.4,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12480","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135993462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The impact of social network embeddedness on mobile massively multiplayer online games play 社交网络嵌入性对移动大型多人在线游戏的影响
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-10-17 DOI: 10.1111/isj.12479
Mingchuan Gong, Christian Wagner, Ahsan Ali

Social factors play a critical role in motivating player participation and commitment to online multiplayer games. Many popular mobile massively multiplayer online games (MMOGs) adopt social network embeddedness (SNE) functions to optimise players' social play experience. SNE changes the traditional pattern of MMOG social play by porting acquaintance relationships (e.g., Facebook friends) from social networking sites to the virtual game world. However, little understanding exists on how SNE impacts mobile MMOG players' game participation results such as play performance and play frequency. Drawing on the affordance framework and social capital literature, this research proposes a theoretical model that integrates the factors of SNE technology affordance (identity transparency and information transparency), players' social experience (social interaction, social support, shared vision, and social pressure), plus affordance effects (play performance and play frequency). The model was validated through a longitudinal field study, in which both subjective and objective data were collected from Game for Peace players. Our findings indicate that identity transparency and information transparency positively correlate with social interaction, social support, shared vision, and social pressure, which, taken together, significantly affect play frequency. The results also show that social interaction and shared vision positively impact players' play performance. The study enhances the theoretical understanding of social relationships in players' game participation results from the SNE aspect. Finally, we lend insights on how game operators can improve player game experience and stickiness.

社交因素在激励玩家参与和投入在线多人游戏方面发挥着至关重要的作用。许多流行的移动大型多人在线游戏(MMOG)采用社交网络嵌入(SNE)功能来优化玩家的社交游戏体验。SNE 通过将熟人关系(如 Facebook 好友)从社交网站移植到虚拟游戏世界,改变了传统的网络游戏社交模式。然而,人们对 SNE 如何影响移动网络游戏玩家的游戏参与结果(如游戏表现和游戏频率)知之甚少。本研究借鉴支付能力框架和社会资本文献,提出了一个理论模型,该模型综合了 SNE 技术支付能力(身份透明和信息透明)、玩家社会体验(社会互动、社会支持、共同愿景和社会压力)以及支付能力效应(游戏表现和游戏频率)等因素。该模型通过一项纵向实地研究得到了验证,在这项研究中,我们收集了 "游戏促和平 "玩家的主观和客观数据。我们的研究结果表明,身份透明度和信息透明度与社会互动、社会支持、共同愿景和社会压力呈正相关,它们共同对游戏频率产生显著影响。研究结果还表明,社会互动和共同愿景对玩家的游戏表现有积极影响。本研究从 SNE 方面加强了对玩家游戏参与结果中社会关系的理论理解。最后,我们还就游戏运营商如何改善玩家的游戏体验和粘性提出了见解。
{"title":"The impact of social network embeddedness on mobile massively multiplayer online games play","authors":"Mingchuan Gong,&nbsp;Christian Wagner,&nbsp;Ahsan Ali","doi":"10.1111/isj.12479","DOIUrl":"10.1111/isj.12479","url":null,"abstract":"<p>Social factors play a critical role in motivating player participation and commitment to online multiplayer games. Many popular mobile massively multiplayer online games (MMOGs) adopt social network embeddedness (SNE) functions to optimise players' social play experience. SNE changes the traditional pattern of MMOG social play by porting acquaintance relationships (e.g., Facebook friends) from social networking sites to the virtual game world. However, little understanding exists on how SNE impacts mobile MMOG players' game participation results such as play performance and play frequency. Drawing on the affordance framework and social capital literature, this research proposes a theoretical model that integrates the factors of SNE technology affordance (identity transparency and information transparency), players' social experience (social interaction, social support, shared vision, and social pressure), plus affordance effects (play performance and play frequency). The model was validated through a longitudinal field study, in which both subjective and objective data were collected from Game for Peace players. Our findings indicate that identity transparency and information transparency positively correlate with social interaction, social support, shared vision, and social pressure, which, taken together, significantly affect play frequency. The results also show that social interaction and shared vision positively impact players' play performance. The study enhances the theoretical understanding of social relationships in players' game participation results from the SNE aspect. Finally, we lend insights on how game operators can improve player game experience and stickiness.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"327-363"},"PeriodicalIF":6.4,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136034228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When workarounds aggravate misfits in the use of electronic health record systems 当变通办法加剧电子病历系统使用中的失误时
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-10-13 DOI: 10.1111/isj.12478
Marjolein A. G. van Offenbeek, Janita F. J. Vos, Bart van den Hooff, Albert Boonstra

This paper contributes to the IS misfits and workarounds literature by demonstrating how “work system–technology” misfits and workarounds can be mutually related. In the context of electronic health record (EHR) systems, this study examines when misfits experienced between an EHR system and health professionals' work practices lead to workarounds with negative consequences in terms of aggravating misfits. Our qualitative study was conducted in two tertiary hospitals in The Netherlands that had implemented an off-the-shelf EHR system. We analysed the “misfit experience → response → consequence” sequences that emerged from interviews complemented with observations and documents. Experienced misfits between the EHR and other work system components induced highly varied responses, among which workarounds. While workarounds can be beneficial, we found occasions where workarounds resulted in aggravated misfits. We conceptualise three underlying misfit-aggravating EHR-use patterns emerging from (1) a non-routine practice's perceived exceptionality, (2) collective separatism in incompatible routine practices, and (3) individual deviancy in routine work practices. These patterns differ in terms of the work practices' routineness, professionals' misfit experiences, and in how this combination provokes an individual or collective workaround that is non-compliant with both the designed technology use and the organisational intent. To understand how these patterns emerge, we discuss the interplay among work practice routineness, misfit characteristics, and non-compliant workaround behaviours.

本文通过论证 "工作系统-技术 "不匹配和变通方法如何相互关联,为信息系统不匹配和变通方法文献做出了贡献。本研究以电子病历(EHR)系统为背景,探讨了电子病历系统与医疗专业人员的工作实践之间的不匹配何时会导致变通方法,从而加剧不匹配的负面影响。我们的定性研究在荷兰两家实施了现成电子病历系统的三级医院进行。我们分析了访谈中出现的 "不匹配经历 → 响应 → 后果 "序列,并辅以观察和文件。电子健康记录与其他工作系统组件之间的不匹配经历导致了多种多样的应对措施,其中包括变通方法。虽然变通办法可能是有益的,但我们也发现有变通办法导致不匹配加剧的情况。我们将电子病历使用中的三种基本误配加重模式概念化,它们分别来自:(1) 非例行工作的特殊性;(2) 与例行工作不兼容的集体分离主义;(3) 例行工作中的个人偏差。这些模式的不同之处在于工作实践的常规性、专业人员的错位体验,以及这种组合如何引发个人或集体的变通办法,而这种变通办法既不符合技术使用的设计,也不符合组织的意图。为了了解这些模式是如何出现的,我们讨论了工作实践的常规性、不适应特征和不合规的变通行为之间的相互作用。
{"title":"When workarounds aggravate misfits in the use of electronic health record systems","authors":"Marjolein A. G. van Offenbeek,&nbsp;Janita F. J. Vos,&nbsp;Bart van den Hooff,&nbsp;Albert Boonstra","doi":"10.1111/isj.12478","DOIUrl":"10.1111/isj.12478","url":null,"abstract":"<p>This paper contributes to the IS misfits and workarounds literature by demonstrating how “work system–technology” misfits and workarounds can be mutually related. In the context of electronic health record (EHR) systems, this study examines when misfits experienced between an EHR system and health professionals' work practices lead to workarounds with negative consequences in terms of aggravating misfits. Our qualitative study was conducted in two tertiary hospitals in The Netherlands that had implemented an off-the-shelf EHR system. We analysed the “misfit experience → response → consequence” sequences that emerged from interviews complemented with observations and documents. Experienced misfits between the EHR and other work system components induced highly varied responses, among which workarounds. While workarounds can be beneficial, we found occasions where workarounds resulted in aggravated misfits. We conceptualise three underlying misfit-aggravating EHR-use patterns emerging from (1) a non-routine practice's perceived exceptionality, (2) collective separatism in incompatible routine practices, and (3) individual deviancy in routine work practices. These patterns differ in terms of the work practices' routineness, professionals' misfit experiences, and in how this combination provokes an individual or collective workaround that is non-compliant with both the designed technology use and the organisational intent. To understand how these patterns emerge, we discuss the interplay among work practice routineness, misfit characteristics, and non-compliant workaround behaviours.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"293-326"},"PeriodicalIF":6.4,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12478","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135858624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can proactively induced organisational citizenship behaviour (OCB) foster positive work attitudes? Theorising the mediating role of ‘meaning of work’ for IT professionals 主动诱导的组织公民行为(OCB)能否促进积极的工作态度?从理论上分析 "工作意义 "对 IT 专业人员的中介作用
IF 6.4 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Pub Date : 2023-10-09 DOI: 10.1111/isj.12473
Shalini Chandra, Shirish C. Srivastava, Damien Joseph

Given the high employee turnover rates among information technology (IT) professionals, firms are on the lookout for ways to retain them. With this end in view, to keep their professionals committed and satisfied, many IT firms are making proactive efforts to induce a favourable organisational environment by encouraging employees towards extra-role organizational citizenship behaviors (OCBs). However, there is scant evidence as to whether orchestrating proactively induced OCB results in positive work attitudes. Our study contributes by theorising the mechanisms through which OCB fosters positive work attitudes among IT professionals, which is expected to lower their turnover rates. Grounding our research in self-perception and self-determination theories, we hypothesize the relationships between IT professionals' OCB and their affective attitudes towards their organisation and job, as being mediated by their cognitive evaluations of the ‘meaning of their IT work’. We test the theorised model with data collected through a large-scale two-wave survey design from a multinational IT-services company. The results offer a nuanced understanding of the relationship between OCB and positive work attitudes for IT professionals, which have significant implications for research and practice.

鉴于信息技术(IT)专业人员的高员工流动率,公司正在寻找留住他们的方法。有鉴于此,为了保持专业人员的忠诚和满意,许多IT公司正在积极努力,通过鼓励员工进行角色外的组织公民行为(ocb)来营造有利的组织环境。然而,很少有证据表明,协调主动诱导的组织公民行为是否会导致积极的工作态度。我们的研究将组织公民行为在IT专业人员中培养积极工作态度的机制理论化,这有望降低他们的离职率。在自我感知和自我决定理论的基础上,我们假设IT专业人员的组织公民行为与他们对组织和工作的情感态度之间的关系,是由他们对“IT工作意义”的认知评估所介导的。我们用一家跨国it服务公司的大规模两波调查设计收集的数据来检验理论模型。研究结果对组织公民行为与IT专业人员积极工作态度之间的关系提供了细致入微的理解,这对研究和实践具有重要意义。
{"title":"Can proactively induced organisational citizenship behaviour (OCB) foster positive work attitudes? Theorising the mediating role of ‘meaning of work’ for IT professionals","authors":"Shalini Chandra,&nbsp;Shirish C. Srivastava,&nbsp;Damien Joseph","doi":"10.1111/isj.12473","DOIUrl":"10.1111/isj.12473","url":null,"abstract":"<p>Given the high employee turnover rates among information technology (IT) professionals, firms are on the lookout for ways to retain them. With this end in view, to keep their professionals committed and satisfied, many IT firms are making proactive efforts to induce a favourable organisational environment by encouraging employees towards extra-role organizational citizenship behaviors (OCBs). However, there is scant evidence as to whether orchestrating proactively induced OCB results in positive work attitudes. Our study contributes by theorising the mechanisms through which OCB fosters positive work attitudes among IT professionals, which is expected to lower their turnover rates. Grounding our research in self-perception and self-determination theories, we hypothesize the relationships between IT professionals' OCB and their affective attitudes towards their organisation and job, as being mediated by their cognitive evaluations of the ‘meaning of their IT work’. We test the theorised model with data collected through a large-scale two-wave survey design from a multinational IT-services company. The results offer a nuanced understanding of the relationship between OCB and positive work attitudes for IT professionals, which have significant implications for research and practice.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 1","pages":"125-178"},"PeriodicalIF":6.4,"publicationDate":"2023-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135147259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information Systems Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1