Miguel I. Aguirre-Urreta, Mikko Rönkkö, George M. Marakas
The literature on formative modelling (“formative measurement”) in the information systems discipline claims that measurement model misspecification, where a reflective model is used instead of a more appropriate formative model, is widespread. In this research, we argue that this cannot be true because models misspecified in this way would fail the measurement validation procedures used with reflective models and thus would not be publishable. To support this argument, we present two extensive simulation studies. The simulation results show that in most cases where data originates from a formative model, estimating a reflective model would not produce results that satisfy the commonly used measurement validation guidelines. Based on these results, we conclude that widespread publication of models where the direction of measurement is misspecified is unlikely in IS and other disciplines that use similar measurement validation guidelines. Moreover, building on recent discussions on modelling endogenous formatively specified latent variables, we demonstrate that the effects of misspecification are minor in models that do pass the model quality check. Our results address important issues in the literature on the consequences of measurement model misspecification and provide a starting point for new advances in this area.
{"title":"Reconsidering the implications of formative versus reflective measurement model misspecification","authors":"Miguel I. Aguirre-Urreta, Mikko Rönkkö, George M. Marakas","doi":"10.1111/isj.12487","DOIUrl":"https://doi.org/10.1111/isj.12487","url":null,"abstract":"<p>The literature on formative modelling (“formative measurement”) in the information systems discipline claims that measurement model misspecification, where a reflective model is used instead of a more appropriate formative model, is widespread. In this research, we argue that this cannot be true because models misspecified in this way would fail the measurement validation procedures used with reflective models and thus would not be publishable. To support this argument, we present two extensive simulation studies. The simulation results show that in most cases where data originates from a formative model, estimating a reflective model would not produce results that satisfy the commonly used measurement validation guidelines. Based on these results, we conclude that widespread publication of models where the direction of measurement is misspecified is unlikely in IS and other disciplines that use similar measurement validation guidelines. Moreover, building on recent discussions on modelling endogenous formatively specified latent variables, we demonstrate that the effects of misspecification are minor in models that do pass the model quality check. Our results address important issues in the literature on the consequences of measurement model misspecification and provide a starting point for new advances in this area.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"533-584"},"PeriodicalIF":6.4,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139704637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
<p>Research misconduct remains a controversial topic and the numbers are staggering. Retractionwatch.com 1 reported that, in 2002, 119 papers were retracted by scientific journals. Some 20 years later, this figure has grown to almost 5000. Put differently, about 8 in 10 000 published papers are retracted from the scientific literature today. The case of Francesca Gino at Harvard University is yet another example. At the time of writing this Editorial, she stands accused of fabricating results across multiple studies, including at least one purporting to show how to elicit honest behaviour (Scheiber, <span>2023</span>). Of course, all this comes at a time when the Information Systems discipline discusses the implications of generative AI in the research process (Davison et al., <span>2023</span>).</p><p>Against this backdrop, we note that our discipline has a solid track-record of addressing ethical <i>research</i> conduct, with Davison and Chatterjee (<span>2024</span>) describing some concerns we should be aware of in a recent Editorial for the <i>Information Systems Journal</i>. In contrast, the debate pertaining to potential misconduct by editors or reviewers is significantly less developed, with just a few examples aimed at mitigating the shortcomings of the peer review process more generally (including, for example, Iivari, <span>2016</span>, Petter, <span>2018</span>, Ralph, <span>2016</span>).</p><p>We here acknowledge that the journey towards publication of any manuscript in any journal does not only involve authors who may act unethically, but also editors and reviewers. While the responsibility for fraudulent studies undoubtedly rests with dishonest authors, editors and reviewers alike share the responsibility for allowing such studies to pass through the peer-review process, for a long time seen as the ‘gold standard’ in preventing such instances from taking place. We therefore firmly believe that the ethical aspects of editorial (mis)conduct should be equally discussed, a task we set out in this Editorial, the second in a series focusing on ethics in IS research in the <i>Information Systems Journal</i>.</p><p>In what follows, we outline key areas where we, in our role as authors, reviewers, and editors, have personally observed behaviour and actions of <i>others</i> we deem questionable. We further augmented our own experiences with anecdotal evidence gathered through conversations with colleagues from within the IS discipline who are distributed around the world. The common denominator across all situations that we outline here is that they took place within the realms of a double-blind peer-review process, meaning reviewers are unaware of the authors' identities, and vice versa, yet that is single-blind for senior editors (SEs) and associate editors (AEs) (editors know the authors' identities, but authors do not know the editors' identities). Nevertheless, it is fair to point out that at some journals, SEs are permitted
{"title":"Ethics II: Editorial conduct","authors":"Andreas Eckhardt, Christoph F. Breidbach","doi":"10.1111/isj.12499","DOIUrl":"10.1111/isj.12499","url":null,"abstract":"<p>Research misconduct remains a controversial topic and the numbers are staggering. Retractionwatch.com\u0000 1 reported that, in 2002, 119 papers were retracted by scientific journals. Some 20 years later, this figure has grown to almost 5000. Put differently, about 8 in 10 000 published papers are retracted from the scientific literature today. The case of Francesca Gino at Harvard University is yet another example. At the time of writing this Editorial, she stands accused of fabricating results across multiple studies, including at least one purporting to show how to elicit honest behaviour (Scheiber, <span>2023</span>). Of course, all this comes at a time when the Information Systems discipline discusses the implications of generative AI in the research process (Davison et al., <span>2023</span>).</p><p>Against this backdrop, we note that our discipline has a solid track-record of addressing ethical <i>research</i> conduct, with Davison and Chatterjee (<span>2024</span>) describing some concerns we should be aware of in a recent Editorial for the <i>Information Systems Journal</i>. In contrast, the debate pertaining to potential misconduct by editors or reviewers is significantly less developed, with just a few examples aimed at mitigating the shortcomings of the peer review process more generally (including, for example, Iivari, <span>2016</span>, Petter, <span>2018</span>, Ralph, <span>2016</span>).</p><p>We here acknowledge that the journey towards publication of any manuscript in any journal does not only involve authors who may act unethically, but also editors and reviewers. While the responsibility for fraudulent studies undoubtedly rests with dishonest authors, editors and reviewers alike share the responsibility for allowing such studies to pass through the peer-review process, for a long time seen as the ‘gold standard’ in preventing such instances from taking place. We therefore firmly believe that the ethical aspects of editorial (mis)conduct should be equally discussed, a task we set out in this Editorial, the second in a series focusing on ethics in IS research in the <i>Information Systems Journal</i>.</p><p>In what follows, we outline key areas where we, in our role as authors, reviewers, and editors, have personally observed behaviour and actions of <i>others</i> we deem questionable. We further augmented our own experiences with anecdotal evidence gathered through conversations with colleagues from within the IS discipline who are distributed around the world. The common denominator across all situations that we outline here is that they took place within the realms of a double-blind peer-review process, meaning reviewers are unaware of the authors' identities, and vice versa, yet that is single-blind for senior editors (SEs) and associate editors (AEs) (editors know the authors' identities, but authors do not know the editors' identities). Nevertheless, it is fair to point out that at some journals, SEs are permitted","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"965-969"},"PeriodicalIF":6.4,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12499","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138952872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In contemporary society, the increased reliance on social media as a vital news source has facilitated the spread of disinformation that has potential polarising effects. Disinformation, false information deliberately crafted to deceive recipients, has escalated to the extent that it is now acknowledged as a significant cybersecurity concern. To proactively tackle this issue, and minimise the risk of negative outcomes associated with disinformation, this research presents a typology of disinformation intentionality and impact (DII) to understand the intentionality and impact of disinformation threats. The typology draws upon information manipulation theory and risk management principles to evaluate the potential impact of disinformation campaigns with respect to their virality and polarising impact. The intentionality of disinformation spread is related to its believability among susceptible consumers, who are likely to propagate the disinformation to others if they assess it to be believable. Based on the dimensions of intentionality and impact, the DII typology can be used to categorise disinformation threats and identify strategies to mitigate its risk. To illustrate its utility for evaluating the risk posted by disinformation campaigns, the DII typology is applied to a case study. We propose risk mitigation strategies as well as recommendations for addressing disinformation campaigns spread through social media platforms.
{"title":"A typology of disinformation intentionality and impact","authors":"Aaron French, Veda C. Storey, Linda Wallace","doi":"10.1111/isj.12495","DOIUrl":"10.1111/isj.12495","url":null,"abstract":"<p>In contemporary society, the increased reliance on social media as a vital news source has facilitated the spread of disinformation that has potential polarising effects. Disinformation, false information deliberately crafted to deceive recipients, has escalated to the extent that it is now acknowledged as a significant cybersecurity concern. To proactively tackle this issue, and minimise the risk of negative outcomes associated with disinformation, this research presents a typology of disinformation intentionality and impact (DII) to understand the intentionality and impact of disinformation threats. The typology draws upon information manipulation theory and risk management principles to evaluate the potential impact of disinformation campaigns with respect to their virality and polarising impact. The intentionality of disinformation spread is related to its believability among susceptible consumers, who are likely to propagate the disinformation to others if they assess it to be believable. Based on the dimensions of intentionality and impact, the DII typology can be used to categorise disinformation threats and identify strategies to mitigate its risk. To illustrate its utility for evaluating the risk posted by disinformation campaigns, the DII typology is applied to a case study. We propose risk mitigation strategies as well as recommendations for addressing disinformation campaigns spread through social media platforms.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"1324-1354"},"PeriodicalIF":6.4,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138958606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Blockchain technology offers the potential to create an open, decentralised governance structure that empowers stakeholders to participate in decentralised engagement. However, how blockchain platforms configure their design elements to establish and maintain decentralised systems with high levels of user governance engagement requires further research. This study investigates the key design elements of blockchain platforms and their ideal configurations for promoting user governance engagement. Due to the complex and interdependent nature of the design elements, we adopt a configurational perspective accompanied by a fuzzy set qualitative comparative analysis (fsQCA) to uncover complex nonlinear relationships among key conditions that are relevant to decentralised governance. Our research identifies five key design elements that facilitate distributed governance (Access to decision rights, Process visibility, Protocol automation, Incentives for developers/miners, and Incentives for other stakeholders) based on existing blockchain governance literature. We analyse 14 unique blockchain platform cases that adopted on-chain governance. Our fsQCA results reveal three ideal types of blockchain governance configurations that are sufficient for high generative user governance engagement: Centralised incentive model, Impartial incentive model, and Automation-driven model, whereas achieving high evaluative governance engagement requires the presence of all the design elements (Comprehensive model). Also, we found Access to decision rights and Protocol automation are necessary conditions for generative governance engagement, and Access to decision rights together with Process visibility is a combined necessary condition for evaluative governance engagement. Relevant theoretical and practical implications for platform designers as well as methodological implications for applying QCA to emerging IS phenomena are discussed.
区块链技术为创建开放、去中心化的治理结构提供了潜力,使利益相关者能够参与去中心化的参与。然而,区块链平台如何配置其设计元素,以建立和维护具有高水平用户治理参与的去中心化系统,还需要进一步研究。本研究调查了区块链平台的关键设计元素及其促进用户治理参与的理想配置。由于设计要素的复杂性和相互依赖性,我们采用了配置视角,并辅以模糊集定性比较分析(fsQCA),以揭示与去中心化治理相关的关键条件之间的复杂非线性关系。我们的研究以现有的区块链治理文献为基础,确定了促进分布式治理的五个关键设计要素(决策权的获取、流程可见性、协议自动化、对开发者/用户的激励以及对其他利益相关者的激励)。我们分析了 14 个采用链上治理的独特区块链平台案例。我们的 fsQCA 结果揭示了三种理想的区块链治理配置类型,它们足以产生较高的用户治理参与度:中心化激励模式、公正激励模式和自动化驱动模式,而要实现高评价性治理参与度,则需要具备所有设计要素(综合模式)。此外,我们还发现获取决策权和协议自动化是生成性治理参与的必要条件,而获取决策权和流程可见性是评价性治理参与的综合必要条件。我们讨论了对平台设计者的相关理论和实践影响,以及将 QCA 应用于新兴 IS 现象的方法论影响。
{"title":"A configurational perspective on design elements and user governance engagement in blockchain platforms","authors":"Rongen “Sophia” Zhang, Balasubramaniam Ramesh","doi":"10.1111/isj.12494","DOIUrl":"10.1111/isj.12494","url":null,"abstract":"<p>Blockchain technology offers the potential to create an open, decentralised governance structure that empowers stakeholders to participate in decentralised engagement. However, how blockchain platforms configure their design elements to establish and maintain decentralised systems with high levels of user governance engagement requires further research. This study investigates the key design elements of blockchain platforms and their ideal configurations for promoting user governance engagement. Due to the complex and interdependent nature of the design elements, we adopt a configurational perspective accompanied by a fuzzy set qualitative comparative analysis (fsQCA) to uncover complex nonlinear relationships among key conditions that are relevant to decentralised governance. Our research identifies five key design elements that facilitate distributed governance (<i>Access to decision rights</i>, <i>Process visibility</i>, <i>Protocol automation</i>, <i>Incentives for developers/miners</i>, and <i>Incentives for other stakeholders</i>) based on existing blockchain governance literature. We analyse 14 unique blockchain platform cases that adopted on-chain governance. Our fsQCA results reveal three ideal types of blockchain governance configurations that are sufficient for high generative user governance engagement: <i>Centralised incentive model</i>, <i>Impartial incentive model</i>, and <i>Automation-driven model</i>, whereas achieving high evaluative governance engagement requires the presence of all the design elements (<i>Comprehensive model</i>). Also, we found <i>Access to decision rights</i> and <i>Protocol automation</i> are necessary conditions for generative governance engagement, and <i>Access to decision right</i>s together with <i>Process visibility</i> is a combined necessary condition for evaluative governance engagement. Relevant theoretical and practical implications for platform designers as well as methodological implications for applying QCA to emerging IS phenomena are discussed.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"1264-1323"},"PeriodicalIF":6.4,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12494","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139170503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luca Gastaldi, Francesco Paolo Appio, Daniel Trabucchi, Tommaso Buganza, Mariano Corso
Digital platforms are increasingly dominating markets by bringing together two or more groups of users and facilitating the exchange of value between them. Although several significant issues concerning the dynamics of digital platforms have been addressed, much of the research effort has focused on the platform owner. On the other hand, research on complementors neither takes into account the individual level nor clearly shows what an individual complementor can do to benefit from platform participation. By studying the evolving relationship between YouTube and its ecosystem of complementors (content creators), we shed light on the strategies that complementors use to progressively avoid but still benefit from platform governance. We find that content creators are, first, in a mutual relationship with the YouTube platform, benefiting from direct monetization. Then, they shift to commensalism as the relationship evolves, allowing them to avoid YouTube's governance and take advantage of multi-homing. Our findings illuminate the effects of platform governance, particularly how it shapes the actions of complementors.
{"title":"From mutualism to commensalism: Assessing the evolving relationship between complementors and digital platforms","authors":"Luca Gastaldi, Francesco Paolo Appio, Daniel Trabucchi, Tommaso Buganza, Mariano Corso","doi":"10.1111/isj.12491","DOIUrl":"10.1111/isj.12491","url":null,"abstract":"<p>Digital platforms are increasingly dominating markets by bringing together two or more groups of users and facilitating the exchange of value between them. Although several significant issues concerning the dynamics of digital platforms have been addressed, much of the research effort has focused on the platform owner. On the other hand, research on complementors neither takes into account the individual level nor clearly shows what an individual complementor can do to benefit from platform participation. By studying the evolving relationship between YouTube and its ecosystem of complementors (content creators), we shed light on the strategies that complementors use to progressively avoid but still benefit from platform governance. We find that content creators are, first, in a mutual relationship with the YouTube platform, benefiting from direct monetization. Then, they shift to commensalism as the relationship evolves, allowing them to avoid YouTube's governance and take advantage of multi-homing. Our findings illuminate the effects of platform governance, particularly how it shapes the actions of complementors.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"1217-1263"},"PeriodicalIF":6.4,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138593869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Robert M. Davison, Rens Scheepers, Stefan Henningsson, Stan Karanasios
<p>Before the rise of online-only publishing, journals, including the ISJ, operated with page budgets, which determined the annual limit of pages that could be published. A decade ago, at the ISJ, this amounted to some 576 journal pages. However, with the advent of online-only publishing, the concept of a page budget has disappeared. The total number of pages increased gradually, at first to 666, to 800 and then it jumped to over 1000. Wiley, the publisher of the ISJ, has informed us that there is no limit at all to how many pages (or articles) we can publish a year, so long as quality standards are maintained. In 2023, the ISJ published 43 research articles, 8 editorials and 3 book reviews, a total of 1458 journal pages or 253% of the pre-online-only model. We expect that in future these numbers will continue to rise.</p><p>Not only has the number of accepted articles increased but also has their length. It used to be the case that we requested authors to keep within 8000 words. This was supposed to be an all-inclusive word count from title to references and appendices. With the passing of time, the restrictions of paper length have largely disappeared. Table 1 below presents the guidance given to authors for the AIS Senior Scholars' List of Premier Journals as well as several others. While there is some wiggle room, the general guidance tends to sit within the 8000- to 12 000-word range, or 38–55 pages. This is similar to adjacent fields: the <i>Academy of Management Journal</i> allows 40 double-spaced pages including references, tables, figures and appendices,1 and Organisation Studies permits up to 13 000 words encompassing references, tables, figures and appendices.2 Computer Science journals tend to publish briefer papers. For instance, IEEE Transactions on Pattern Analysis and Machine Intelligence allows 35 double spaced pages3 and IEEE Communications Surveys & Tutorials charges authors $220 for per page over 30 pages (up to 8 pages).4</p><p>Today it is not unusual for a first-round submission to be in the 12 000-word range and for a finally accepted article to be 15 000. Even 20 000-word epics are by no means unheard of. Why all this verbosity? One reason is that authors and reviewers get trapped in what we call a text-accumulation trap. Authors submit papers with as much information as possible, hoping to instil confidence in the review team as to its completeness, as well as to prepare for both expected and unexpected reviewer demands. Reviewers then read the paper, yet ask for even more detail, and authors feel obliged to respond in kind. Over multiple revision cycles, satisfying all the reviewers requires ever more words. Reviewers should be mindful of the text-accumulation trap. When requesting authors to incorporate large amounts of new material, it is necessary to weigh the value of this extra material against the risk of unnecessarily bloating the manuscript.</p><p>In addition, it is easier to write more than less, easier to i
{"title":"The virtue of brevity","authors":"Robert M. Davison, Rens Scheepers, Stefan Henningsson, Stan Karanasios","doi":"10.1111/isj.12492","DOIUrl":"10.1111/isj.12492","url":null,"abstract":"<p>Before the rise of online-only publishing, journals, including the ISJ, operated with page budgets, which determined the annual limit of pages that could be published. A decade ago, at the ISJ, this amounted to some 576 journal pages. However, with the advent of online-only publishing, the concept of a page budget has disappeared. The total number of pages increased gradually, at first to 666, to 800 and then it jumped to over 1000. Wiley, the publisher of the ISJ, has informed us that there is no limit at all to how many pages (or articles) we can publish a year, so long as quality standards are maintained. In 2023, the ISJ published 43 research articles, 8 editorials and 3 book reviews, a total of 1458 journal pages or 253% of the pre-online-only model. We expect that in future these numbers will continue to rise.</p><p>Not only has the number of accepted articles increased but also has their length. It used to be the case that we requested authors to keep within 8000 words. This was supposed to be an all-inclusive word count from title to references and appendices. With the passing of time, the restrictions of paper length have largely disappeared. Table 1 below presents the guidance given to authors for the AIS Senior Scholars' List of Premier Journals as well as several others. While there is some wiggle room, the general guidance tends to sit within the 8000- to 12 000-word range, or 38–55 pages. This is similar to adjacent fields: the <i>Academy of Management Journal</i> allows 40 double-spaced pages including references, tables, figures and appendices,1 and Organisation Studies permits up to 13 000 words encompassing references, tables, figures and appendices.2 Computer Science journals tend to publish briefer papers. For instance, IEEE Transactions on Pattern Analysis and Machine Intelligence allows 35 double spaced pages3 and IEEE Communications Surveys & Tutorials charges authors $220 for per page over 30 pages (up to 8 pages).4</p><p>Today it is not unusual for a first-round submission to be in the 12 000-word range and for a finally accepted article to be 15 000. Even 20 000-word epics are by no means unheard of. Why all this verbosity? One reason is that authors and reviewers get trapped in what we call a text-accumulation trap. Authors submit papers with as much information as possible, hoping to instil confidence in the review team as to its completeness, as well as to prepare for both expected and unexpected reviewer demands. Reviewers then read the paper, yet ask for even more detail, and authors feel obliged to respond in kind. Over multiple revision cycles, satisfying all the reviewers requires ever more words. Reviewers should be mindful of the text-accumulation trap. When requesting authors to incorporate large amounts of new material, it is necessary to weigh the value of this extra material against the risk of unnecessarily bloating the manuscript.</p><p>In addition, it is easier to write more than less, easier to i","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"287-292"},"PeriodicalIF":6.4,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12492","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139207329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Interactive decision aids (IDAs) on websites often require users to disclose relevant information (e.g., preferences, contact information) to help users in making decisions (e.g., product choice). With technological advances in IDAs, websites increasingly switch from static, non-conversational IDAs (e.g., web forms) to conversational ones (e.g., chatbots) to boost user information disclosure that nurtures the websites' economic viability. While this novel form of IDAs is already widely employed in practice, information systems research has yet to examine the defining dialogue design features of conversational IDAs and their effects on eliciting user information. Drawing on persuasion theory and particularly on consistency and reciprocity as influence techniques, we develop a research model around two crucial dialogue design features of conversational IDAs. Specifically, we investigate the distinct and joint effects of conversational style (i.e., absence vs. presence of a conversational presentation of requests) and reciprocation triggers (i.e., absence vs. presence of reciprocity-inducing information) on user information disclosure (i.e., email addresses). By combining the complementary properties of a randomised field experiment (N = 386) and a follow-up online experiment (N = 182), we empirically provide evidence in support of the distinct and joint effects of conversational style and reciprocation triggers of IDAs on user information disclosure. Moreover, we demonstrate that these dialogue design features have indirect effects on information disclosure via perceptions of social presence and privacy concerns. Thus, our paper provides theoretical and practical insights into whether, how, and why critical IDA dialogue design features can better elicit user information for website services.
网站上的交互式辅助决策工具(IDA)通常要求用户披露相关信息(如偏好、联系信息),以帮助用户做出决策(如产品选择)。随着 IDA 技术的进步,网站越来越多地从静态、非对话式 IDA(如网络表单)转向对话式 IDA(如聊天机器人),以促进用户信息披露,从而提高网站的经济效益。虽然这种新形式的国际开发协会已在实践中得到广泛应用,但信息系统研究尚未对对话式国际开发协会的对话设计特点及其对获取用户信息的影响进行研究。借鉴说服理论,特别是作为影响技术的一致性和互惠性,我们围绕会话式 IDA 的两个关键对话设计特征建立了一个研究模型。具体来说,我们研究了会话风格(即没有与有会话请求)和互惠触发器(即没有与有互惠诱导信息)对用户信息披露(即电子邮件地址)的独特和共同影响。通过结合随机现场实验(N = 386)和后续在线实验(N = 182)的互补特性,我们从经验上提供了证据,证明了 IDA 的对话风格和互惠触发器对用户信息披露的独特和共同影响。此外,我们还证明了这些对话设计特征会通过社会存在感和隐私问题对信息披露产生间接影响。因此,我们的论文为关键的 IDA 对话设计特征是否、如何以及为何能更好地为网站服务获取用户信息提供了理论和实践见解。
{"title":"From web forms to chatbots: The roles of consistency and reciprocity for user information disclosure","authors":"Martin Adam, Alexander Benlian","doi":"10.1111/isj.12490","DOIUrl":"10.1111/isj.12490","url":null,"abstract":"<p>Interactive decision aids (IDAs) on websites often require users to disclose relevant information (e.g., preferences, contact information) to help users in making decisions (e.g., product choice). With technological advances in IDAs, websites increasingly switch from static, non-conversational IDAs (e.g., web forms) to conversational ones (e.g., chatbots) to boost user information disclosure that nurtures the websites' economic viability. While this novel form of IDAs is already widely employed in practice, information systems research has yet to examine the defining dialogue design features of conversational IDAs and their effects on eliciting user information. Drawing on persuasion theory and particularly on consistency and reciprocity as influence techniques, we develop a research model around two crucial dialogue design features of conversational IDAs. Specifically, we investigate the distinct and joint effects of conversational style (i.e., absence vs. presence of a conversational presentation of requests) and reciprocation triggers (i.e., absence vs. presence of reciprocity-inducing information) on user information disclosure (i.e., email addresses). By combining the complementary properties of a randomised field experiment (<i>N</i> = 386) and a follow-up online experiment (<i>N</i> = 182), we empirically provide evidence in support of the distinct and joint effects of conversational style and reciprocation triggers of IDAs on user information disclosure. Moreover, we demonstrate that these dialogue design features have indirect effects on information disclosure via perceptions of social presence and privacy concerns. Thus, our paper provides theoretical and practical insights into whether, how, and why critical IDA dialogue design features can better elicit user information for website services.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"1175-1216"},"PeriodicalIF":6.4,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12490","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139226418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Feng Xu, Carol Hsu, Tawei (David) Wang, Paul Benjamin Lowry
Organisational information security (ISec) protection is undergoing a turbulent shift in the workplace environment. In an environment of ever-increasing risks of insider threats and external cyberattacks, individual employees are often expected to take the initiative to solve organisational security problems. This study therefore focuses on employees' proactive information security behaviours (ISBs)—behaviours that are self-initiated, change-oriented, and future-focused—and the motivations that compel employees to protect organisational assets. We ground our study in Parker et al. (2010) proactive motivation theory (ProMT) and develop an integrated multilevel model to examine the respective effects of proactive motivational states, that is, can-do, reason-to, and energised-to motivations, on employees' proactive ISBs. We also explore the roles of individual differences and contextual factors—namely, proactive personality and supervisory ISec support—and their influences on proactive motivational states. Data were collected from 210 employees situated in 55 departments distributed among multiple organisations located in China. The results show that supervisory ISec support positively influences employees' proactive motivational states and thereby boosts employees' proactive ISBs. Proactive personality negatively moderates the effect of supervisory ISec support on flexible security role orientation (reason-to motivation). By identifying the antecedents of employees' proactive ISBs, we make key theoretical contributions to ISec research and valuable practical contributions to organisational ISec management.
{"title":"The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation","authors":"Feng Xu, Carol Hsu, Tawei (David) Wang, Paul Benjamin Lowry","doi":"10.1111/isj.12488","DOIUrl":"10.1111/isj.12488","url":null,"abstract":"<p>Organisational information security (ISec) protection is undergoing a turbulent shift in the workplace environment. In an environment of ever-increasing risks of insider threats and external cyberattacks, individual employees are often expected to take the initiative to solve organisational security problems. This study therefore focuses on employees' proactive <i>information security behaviours</i> (ISBs)—behaviours that are self-initiated, change-oriented, and future-focused—and the motivations that compel employees to protect organisational assets. We ground our study in Parker et al. (2010) proactive motivation theory (ProMT) and develop an integrated multilevel model to examine the respective effects of proactive motivational states, that is, <i>can-do</i>, <i>reason-to</i>, and <i>energised-to</i> motivations, on employees' proactive ISBs. We also explore the roles of individual differences and contextual factors—namely, proactive personality and supervisory ISec support—and their influences on proactive motivational states. Data were collected from 210 employees situated in 55 departments distributed among multiple organisations located in China. The results show that supervisory ISec support positively influences employees' proactive motivational states and thereby boosts employees' proactive ISBs. Proactive personality negatively moderates the effect of supervisory ISec support on flexible security role orientation (reason-to motivation). By identifying the antecedents of employees' proactive ISBs, we make key theoretical contributions to ISec research and valuable practical contributions to organisational ISec management.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"1144-1174"},"PeriodicalIF":6.4,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12488","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139249660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is well known that corporations rely on open source software as part of their product development lifecycle. Given these commitments, understanding the health of open source communities is a central concern in today's business setting. Our research uses social comparison theory as a framework for understanding how open source communities consider community health beyond any single metric within any single open source community—including a broader view of how others are using these health indicators in practice. Using methods from engaged field research, including 38 interviews, we examine practices of social comparison as an advancement in understanding open source community health—and subsequently engagement with open source communities. The results of this study show that open source community health is not a single set of discrete metrics but is an ongoing social construction. Through our study, we advance theoretical and applied knowledge regarding issues of open source community health, open source community engagement, and social comparison.
{"title":"An empirical investigation of social comparison and open source community health","authors":"Kevin Lumbard, Matt Germonprez, Sean Goggins","doi":"10.1111/isj.12485","DOIUrl":"10.1111/isj.12485","url":null,"abstract":"<p>It is well known that corporations rely on open source software as part of their product development lifecycle. Given these commitments, understanding the health of open source communities is a central concern in today's business setting. Our research uses social comparison theory as a framework for understanding how open source communities consider community health beyond any single metric within any single open source community—including a broader view of how others are using these health indicators in practice. Using methods from engaged field research, including 38 interviews, we examine practices of social comparison as an advancement in understanding open source community health—and subsequently engagement with open source communities. The results of this study show that open source community health is not a single set of discrete metrics but is an ongoing social construction. Through our study, we advance theoretical and applied knowledge regarding issues of open source community health, open source community engagement, and social comparison.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 2","pages":"499-532"},"PeriodicalIF":6.4,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139274666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prosocial punishments by social media bystanders could block the path from misinformation spread to social media-induced polarization (SMIP). However, prosocial punishments are inadequate for SMIP management because of the personal costs, and few studies propose effective ways to mobilize bystanders. The Chinese government implemented a regulation in 2017 to mobilize bystanders on social media through allocating accountability to act as misinformation supervisors. In China's guanxi culture, prosocial punishments are less observed considering the additional personal costs caused by breaking guanxi. Therefore, assessing the effectiveness of China's cyberspace accountability mobilization can help identify an effective tool for other governments to mitigate SMIP. We used a vignette survey experiment to collect data from WeChat users and applied a random regression model to analyse the data. Accountability mobilization significantly promotes bystanders' prosocial punishment to block the misinformation-spread-to-SMIP path. Guanxi negatively moderates the relationship between accountability mobilization and prosocial punishment to the above path. The government could encourage the public to actively take prosocial punishments by using the new tool of accountability mobilization. Guanxi culture reduces the effectiveness of the tool.
{"title":"Accountability mobilization, guanxi and social media-induced polarization: Understanding the bystander's prosocial punishment to misinformation spreader","authors":"Zhe Zhu, Nan Zhang, Meiwen Ding, Lei Chen","doi":"10.1111/isj.12486","DOIUrl":"10.1111/isj.12486","url":null,"abstract":"<p>Prosocial punishments by social media bystanders could block the path from misinformation spread to social media-induced polarization (SMIP). However, prosocial punishments are inadequate for SMIP management because of the personal costs, and few studies propose effective ways to mobilize bystanders. The Chinese government implemented a regulation in 2017 to mobilize bystanders on social media through allocating accountability to act as misinformation supervisors. In China's guanxi culture, prosocial punishments are less observed considering the additional personal costs caused by breaking guanxi. Therefore, assessing the effectiveness of China's cyberspace accountability mobilization can help identify an effective tool for other governments to mitigate SMIP. We used a vignette survey experiment to collect data from WeChat users and applied a random regression model to analyse the data. Accountability mobilization significantly promotes bystanders' prosocial punishment to block the misinformation-spread-to-SMIP path. Guanxi negatively moderates the relationship between accountability mobilization and prosocial punishment to the above path. The government could encourage the public to actively take prosocial punishments by using the new tool of accountability mobilization. Guanxi culture reduces the effectiveness of the tool.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 4","pages":"1116-1143"},"PeriodicalIF":6.4,"publicationDate":"2023-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135038492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}