Given the widespread adoption of online learning, it is crucial to examine how these platforms can effectively maintain learners’ motivation and engagement. This study suggests that the prevalent hands-off, self-directed design approach, which relies heavily on learners’ intrinsic motivation, can potentially neglect crucial aspects like achievement emotions and lead to disengagement. Our findings show that online learning providers can address this issue through motivational interventions based on situational achievement goals. Specifically, our results indicate that among three achievement goals, learning, performance-prove and performance-avoidance, the performance-prove goal is the most effective one in enhancing learner engagement and performance. Additionally, we discuss that a one-size-fits-all course design may not be the most effective strategy for maintaining high engagement. Customizing interventions based on learners’ motivational behavior, prior performance, and social activity can significantly improve engagement. Learners with stronger prior performance benefit more from the performance-prove goal, whereas those with moderate performance levels gain from the performance-avoidance goal, and those with lower prior performance are positively influenced by the learning goal. Socially isolated learners respond best to performance goals.
{"title":"The Impact of Situational Achievement Goals on Online Learning Behavior: Results from Field Experiments","authors":"Nasim Mousavi, Sina Golara, Jesse Bockstedt","doi":"10.1287/isre.2022.0353","DOIUrl":"https://doi.org/10.1287/isre.2022.0353","url":null,"abstract":"Given the widespread adoption of online learning, it is crucial to examine how these platforms can effectively maintain learners’ motivation and engagement. This study suggests that the prevalent hands-off, self-directed design approach, which relies heavily on learners’ intrinsic motivation, can potentially neglect crucial aspects like achievement emotions and lead to disengagement. Our findings show that online learning providers can address this issue through motivational interventions based on situational achievement goals. Specifically, our results indicate that among three achievement goals, learning, performance-prove and performance-avoidance, the performance-prove goal is the most effective one in enhancing learner engagement and performance. Additionally, we discuss that a one-size-fits-all course design may not be the most effective strategy for maintaining high engagement. Customizing interventions based on learners’ motivational behavior, prior performance, and social activity can significantly improve engagement. Learners with stronger prior performance benefit more from the performance-prove goal, whereas those with moderate performance levels gain from the performance-avoidance goal, and those with lower prior performance are positively influenced by the learning goal. Socially isolated learners respond best to performance goals.","PeriodicalId":48411,"journal":{"name":"Information Systems Research","volume":"60 1","pages":""},"PeriodicalIF":4.9,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141938544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Within the field of serialized digital content, platforms have recently introduced the ad-sponsored model to provide free content and attract readers. Although this model potentially benefits readers by removing financial barriers, its impact on content creators remains unclear. Our study investigates the effects of the ad-sponsored model on the content creators’ productivity by leveraging a policy change on a leading web novel platform as a natural experiment. Our findings indicate a significant decline in content creators’ efforts in the ad-sponsored model, suggesting the potential adverse effects. Our results demonstrate that this decline is primarily due to reduced reader engagement, as readers may perceive lower “sunk costs” with free content compared with paid content. Our findings provide valuable insights for serialized digital content platforms adopting or considering the ad-sponsored model, emphasizing the importance of considering both creator and user dynamics when introducing new business models.
{"title":"Unveiling the Cost of Free: How an Ad-Sponsored Model Affects Serialized Digital Content Creation","authors":"Kaiyu Zhang, Qili Wang, Liangfei Qiu, Nan Wang","doi":"10.1287/isre.2023.0263","DOIUrl":"https://doi.org/10.1287/isre.2023.0263","url":null,"abstract":"Within the field of serialized digital content, platforms have recently introduced the ad-sponsored model to provide free content and attract readers. Although this model potentially benefits readers by removing financial barriers, its impact on content creators remains unclear. Our study investigates the effects of the ad-sponsored model on the content creators’ productivity by leveraging a policy change on a leading web novel platform as a natural experiment. Our findings indicate a significant decline in content creators’ efforts in the ad-sponsored model, suggesting the potential adverse effects. Our results demonstrate that this decline is primarily due to reduced reader engagement, as readers may perceive lower “sunk costs” with free content compared with paid content. Our findings provide valuable insights for serialized digital content platforms adopting or considering the ad-sponsored model, emphasizing the importance of considering both creator and user dynamics when introducing new business models.","PeriodicalId":48411,"journal":{"name":"Information Systems Research","volume":"26 1","pages":""},"PeriodicalIF":4.9,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141938546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Under performance-based advertising, firms pay only for measurable consumer actions, such as clicks or sales. However, these actions may result from factors other than effective advertising. For example, a high-reputation seller is more likely to generate more actions than a low-reputation seller. If such consumer actions are counted toward advertising performance, a high-quality firm is penalized because it has to pay more than necessary to signal its quality. Without addressing these paradoxes, it becomes increasingly challenging for a high-quality firm to signal its quality under the performance-based advertising scheme. Our research extends advertising signaling theory, which primarily focuses on new products without an established reputation and assumes that the advertising reaches the entire market (e.g., Milgrom and Roberts 1986 , Feng and Xie 2012 ). Instead, we consider products that may have an established reputation (e.g., newer versions of the iPhone) and allow for the scenario that not every market segment can be reached by the advertising. We identify two paradoxes that arise from performance-based advertising and discuss methods to mitigate these paradoxes by proposing different ways of measuring advertising performance.
{"title":"Better Is Better? Signaling Paradoxes in Performance-Based Advertising","authors":"Ran Pan, Juan Feng","doi":"10.1287/isre.2021.0419","DOIUrl":"https://doi.org/10.1287/isre.2021.0419","url":null,"abstract":"Under performance-based advertising, firms pay only for measurable consumer actions, such as clicks or sales. However, these actions may result from factors other than effective advertising. For example, a high-reputation seller is more likely to generate more actions than a low-reputation seller. If such consumer actions are counted toward advertising performance, a high-quality firm is penalized because it has to pay more than necessary to signal its quality. Without addressing these paradoxes, it becomes increasingly challenging for a high-quality firm to signal its quality under the performance-based advertising scheme. Our research extends advertising signaling theory, which primarily focuses on new products without an established reputation and assumes that the advertising reaches the entire market (e.g., Milgrom and Roberts 1986 , Feng and Xie 2012 ). Instead, we consider products that may have an established reputation (e.g., newer versions of the iPhone) and allow for the scenario that not every market segment can be reached by the advertising. We identify two paradoxes that arise from performance-based advertising and discuss methods to mitigate these paradoxes by proposing different ways of measuring advertising performance.","PeriodicalId":48411,"journal":{"name":"Information Systems Research","volume":"49 1","pages":""},"PeriodicalIF":4.9,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141872823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although platform owners create significant entrepreneurial opportunities for third-party developers, they frequently compete with them by entering the same markets. This study examines the impact of opening a first-party app’s resources on rivals’ innovation. Unlike prior research, which assumes that first-party apps have exclusive access to their resources, our study reveals that increased openness of first-party apps leads to free-riding benefits for rivals. This openness boosts rivals’ consumer demand, thereby fostering greater innovation. Our findings show that rivals attract more consumers because of complementary offerings available through alternatives, rather than through improved experiences provided by third-party apps utilizing the first-party app’s open resources. Our research provides two key implications. First, beyond platform openness, platform owners might consider first-party apps’ openness as a strategy to enhance the ecosystem’s evolvability. Second, third-party developers can enhance their innovation capabilities to better exploit the free-riding benefits stemming from the openness of first-party apps.
{"title":"Opening First-Party App Resources: Empirical Evidence of Free-Riding","authors":"Franck Soh, Pankaj Setia, Varun Grover","doi":"10.1287/isre.2021.0607","DOIUrl":"https://doi.org/10.1287/isre.2021.0607","url":null,"abstract":"Although platform owners create significant entrepreneurial opportunities for third-party developers, they frequently compete with them by entering the same markets. This study examines the impact of opening a first-party app’s resources on rivals’ innovation. Unlike prior research, which assumes that first-party apps have exclusive access to their resources, our study reveals that increased openness of first-party apps leads to free-riding benefits for rivals. This openness boosts rivals’ consumer demand, thereby fostering greater innovation. Our findings show that rivals attract more consumers because of complementary offerings available through alternatives, rather than through improved experiences provided by third-party apps utilizing the first-party app’s open resources. Our research provides two key implications. First, beyond platform openness, platform owners might consider first-party apps’ openness as a strategy to enhance the ecosystem’s evolvability. Second, third-party developers can enhance their innovation capabilities to better exploit the free-riding benefits stemming from the openness of first-party apps.","PeriodicalId":48411,"journal":{"name":"Information Systems Research","volume":"413 1","pages":""},"PeriodicalIF":4.9,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141779438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Henner Gimpel, Julia Lanzl, Christian Regal, Nils Urbach, Julia Becker, Patricia Tegtmeier
Digital technologies, although enhancing productivity and communication, also contribute to technostress at work. This study addresses the fragmentation in existing models of hindrance technostressors by proposing a unified hierarchical model of digital hindrance stressors tailored to contemporary digital work environments. The research synthesizes various existing models and uses a mixed-methods approach, including a qualitative prestudy and extensive surveys with more than 5,800 participants to identify and validate 12 first-order and 5 second-order digital hindrance stressors. The new model offers both detailed and streamlined measurement tools, enhancing its applicability in diverse organizational contexts. For practitioners and policymakers, this study provides a comprehensive framework to assess and mitigate the adverse impacts of digital stressors. The unified model allows organizations to understand specific stressors their employees face and implement targeted interventions to improve well-being and productivity. By using this model, occupational health professionals can better address the psychological and physical health implications of technostress. Moreover, the findings offer actionable insights for designing digital work environments that minimize stress and foster a healthier, more productive workforce. This research bridges the gap between theoretical technostress models and practical applications, guiding effective strategies for managing digital workplace stress.
{"title":"Stress from Digital Work: Toward a Unified View of Digital Hindrance Stressors","authors":"Henner Gimpel, Julia Lanzl, Christian Regal, Nils Urbach, Julia Becker, Patricia Tegtmeier","doi":"10.1287/isre.2022.0691","DOIUrl":"https://doi.org/10.1287/isre.2022.0691","url":null,"abstract":"Digital technologies, although enhancing productivity and communication, also contribute to technostress at work. This study addresses the fragmentation in existing models of hindrance technostressors by proposing a unified hierarchical model of digital hindrance stressors tailored to contemporary digital work environments. The research synthesizes various existing models and uses a mixed-methods approach, including a qualitative prestudy and extensive surveys with more than 5,800 participants to identify and validate 12 first-order and 5 second-order digital hindrance stressors. The new model offers both detailed and streamlined measurement tools, enhancing its applicability in diverse organizational contexts. For practitioners and policymakers, this study provides a comprehensive framework to assess and mitigate the adverse impacts of digital stressors. The unified model allows organizations to understand specific stressors their employees face and implement targeted interventions to improve well-being and productivity. By using this model, occupational health professionals can better address the psychological and physical health implications of technostress. Moreover, the findings offer actionable insights for designing digital work environments that minimize stress and foster a healthier, more productive workforce. This research bridges the gap between theoretical technostress models and practical applications, guiding effective strategies for managing digital workplace stress.","PeriodicalId":48411,"journal":{"name":"Information Systems Research","volume":"62 1","pages":""},"PeriodicalIF":4.9,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141740736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Konstantin Bauman, Alexander Tuzhilin, Moshe Unger
Contextual situations, such as having dinner at a restaurant on Friday with the spouse, became a useful mechanism to represent context in context-aware recommender systems (CARS). Prior research has shown important advantages of using latent embedding representation approaches to model contextual information in the Euclidean space leading to better recommendations. However, these traditional approaches have major challenges with the construction of proper embeddings of hierarchical structures of contextual information, as well as with interpretations of the obtained representations. To address these problems, we propose the HyperCARS method that models hierarchical contextual situations in the latent hyperbolic space. HyperCARS combines hyperbolic embeddings with hierarchical clustering to construct contextual situations, which allows loose coupling of the contextual modeling component with recommendation algorithms and, therefore, provides flexibility to use a broad range of previously developed recommendation algorithms. We demonstrate empirically that HyperCARS better captures and interprets hierarchical contextual representations, leading to better context-aware recommendations. Because hyperbolic embeddings can also be used in many other applications besides CARS, we also propose the latent embeddings representation framework that systematically classifies prior work on embeddings and identifies novel research streams for hyperbolic embeddings across information systems applications.
{"title":"HyperCARS: Using Hyperbolic Embeddings for Generating Hierarchical Contextual Situations in Context-Aware Recommender Systems","authors":"Konstantin Bauman, Alexander Tuzhilin, Moshe Unger","doi":"10.1287/isre.2022.0202","DOIUrl":"https://doi.org/10.1287/isre.2022.0202","url":null,"abstract":"Contextual situations, such as having dinner at a restaurant on Friday with the spouse, became a useful mechanism to represent context in context-aware recommender systems (CARS). Prior research has shown important advantages of using latent embedding representation approaches to model contextual information in the Euclidean space leading to better recommendations. However, these traditional approaches have major challenges with the construction of proper embeddings of hierarchical structures of contextual information, as well as with interpretations of the obtained representations. To address these problems, we propose the HyperCARS method that models hierarchical contextual situations in the latent hyperbolic space. HyperCARS combines hyperbolic embeddings with hierarchical clustering to construct contextual situations, which allows loose coupling of the contextual modeling component with recommendation algorithms and, therefore, provides flexibility to use a broad range of previously developed recommendation algorithms. We demonstrate empirically that HyperCARS better captures and interprets hierarchical contextual representations, leading to better context-aware recommendations. Because hyperbolic embeddings can also be used in many other applications besides CARS, we also propose the latent embeddings representation framework that systematically classifies prior work on embeddings and identifies novel research streams for hyperbolic embeddings across information systems applications.","PeriodicalId":48411,"journal":{"name":"Information Systems Research","volume":"3 1","pages":""},"PeriodicalIF":4.9,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141569901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Practice- and Policy-Oriented AbstractRecently, some user-generated content (UGC) platforms have introduced shopping features to generate additional commission-based revenue from in-app transactions. These platforms allow creators to produce shoppable content, where promoted products are tagged with affiliate links, and in return, they earn a percentage of the commission the creators receive from merchants This paper aims to investigate the impact of this platform-led affiliate marketing business model on the key stakeholders. Employing a game-theoretic model, our study demonstrates that platform-led affiliate marketing can create a win-win situation for UGC platforms, creators participating in affiliate marketing, and consumers. Furthermore, even creators not participating in affiliate marketing can sometimes benefit indirectly from other creators’ participation. However, we find that platforms may not necessarily benefit from adopting this emerging business model because of potential losses in traffic revenue. These results carry significant managerial implications for platforms regarding whether and how to leverage affiliate marketing. Moreover, our findings suggest that creators may benefit from reducing their production efforts in the face of intensified competition. More importantly, optimal production decisions for creators can vary significantly, depending on specific factors contributing to heightened competition. These findings offer valuable insights that can guide creators in refining their production strategies.
以实践和政策为导向 摘要最近,一些用户生成内容(UGC)平台推出了购物功能,以便从应用内交易中获得额外的佣金收入。这些平台允许创作者制作可购物的内容,在推广的产品上标注联盟链接,作为回报,平台从创作者从商家获得的佣金中赚取一定比例的收益。通过运用博弈论模型,我们的研究表明,平台主导的联盟营销可以为 UGC 平台、参与联盟营销的创作者和消费者创造一个多赢的局面。此外,即使没有参与联盟营销的创作者有时也能从其他创作者的参与中间接获益。然而,我们发现,平台不一定能从采用这种新兴商业模式中获益,因为可能会损失流量收入。这些结果对平台是否以及如何利用联盟营销具有重要的管理意义。此外,我们的研究结果表明,在竞争加剧的情况下,创作者可能会从减少制作力度中获益。更重要的是,根据导致竞争加剧的具体因素,创作者的最佳生产决策会有很大不同。这些发现提供了宝贵的见解,可以指导创作者完善其制作策略。
{"title":"Navigating Platform-Led Affiliate Marketing: Implications for Content Creation and Platform Profitability","authors":"Meilin Gu, Dengpan Liu, Subodha Kumar","doi":"10.1287/isre.2022.0620","DOIUrl":"https://doi.org/10.1287/isre.2022.0620","url":null,"abstract":"Practice- and Policy-Oriented AbstractRecently, some user-generated content (UGC) platforms have introduced shopping features to generate additional commission-based revenue from in-app transactions. These platforms allow creators to produce shoppable content, where promoted products are tagged with affiliate links, and in return, they earn a percentage of the commission the creators receive from merchants This paper aims to investigate the impact of this platform-led affiliate marketing business model on the key stakeholders. Employing a game-theoretic model, our study demonstrates that platform-led affiliate marketing can create a win-win situation for UGC platforms, creators participating in affiliate marketing, and consumers. Furthermore, even creators not participating in affiliate marketing can sometimes benefit indirectly from other creators’ participation. However, we find that platforms may not necessarily benefit from adopting this emerging business model because of potential losses in traffic revenue. These results carry significant managerial implications for platforms regarding whether and how to leverage affiliate marketing. Moreover, our findings suggest that creators may benefit from reducing their production efforts in the face of intensified competition. More importantly, optimal production decisions for creators can vary significantly, depending on specific factors contributing to heightened competition. These findings offer valuable insights that can guide creators in refining their production strategies.","PeriodicalId":48411,"journal":{"name":"Information Systems Research","volume":"9 1","pages":""},"PeriodicalIF":4.9,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141569903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Simon Trang, Tobias Kraemer, Manuel Trenz, Welf H. Weiger
Conspiracy theories are increasingly emerging as a threat to contemporary society. Prior research highlights the crucial role that information technology (IT) plays in accelerating the spread of these theories. However, mass media coverage suggests that the role of IT extends beyond mere dissemination as conspiracy theories often target the technology itself. In this research, we explore the prevalence of technology conspiracy beliefs—specifically, beliefs in technology-related conspiracy theories, the factors promoting these beliefs, and their consequences. Our findings reveal that technology conspiracy beliefs are widespread, affecting popular commercial technologies, such as Amazon Echo and Google Search Engine, as well as public technologies designed for societal well-being, such as contact tracing apps. Moreover, we demonstrate across four empirical studies that technology conspiracy beliefs reinforce a conspiracy mindset. This mindset is associated with a breakdown of social collaboration, constructive political discourse, and society’s ability to respond to crises. Given that these beliefs impede the adoption of beneficial technology and foster a harmful conspiracy mindset, they should be a primary concern for technology designers, managers, and policymakers. By identifying the perceptions of technology and its provider that promote these conspiracy beliefs, we provide initial insights into ways to mitigate their emergence.
{"title":"Deeper Down the Rabbit Hole: How Technology Conspiracy Beliefs Emerge and Foster a Conspiracy Mindset","authors":"Simon Trang, Tobias Kraemer, Manuel Trenz, Welf H. Weiger","doi":"10.1287/isre.2022.0494","DOIUrl":"https://doi.org/10.1287/isre.2022.0494","url":null,"abstract":"Conspiracy theories are increasingly emerging as a threat to contemporary society. Prior research highlights the crucial role that information technology (IT) plays in accelerating the spread of these theories. However, mass media coverage suggests that the role of IT extends beyond mere dissemination as conspiracy theories often target the technology itself. In this research, we explore the prevalence of technology conspiracy beliefs—specifically, beliefs in technology-related conspiracy theories, the factors promoting these beliefs, and their consequences. Our findings reveal that technology conspiracy beliefs are widespread, affecting popular commercial technologies, such as Amazon Echo and Google Search Engine, as well as public technologies designed for societal well-being, such as contact tracing apps. Moreover, we demonstrate across four empirical studies that technology conspiracy beliefs reinforce a conspiracy mindset. This mindset is associated with a breakdown of social collaboration, constructive political discourse, and society’s ability to respond to crises. Given that these beliefs impede the adoption of beneficial technology and foster a harmful conspiracy mindset, they should be a primary concern for technology designers, managers, and policymakers. By identifying the perceptions of technology and its provider that promote these conspiracy beliefs, we provide initial insights into ways to mitigate their emergence.","PeriodicalId":48411,"journal":{"name":"Information Systems Research","volume":"212 1","pages":""},"PeriodicalIF":4.9,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141526503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
From a management perspective, our results first reveal the detrimental impacts of daily technostressors on the functioning of an organization and its employees. Managers should be cognizant of these consequences and create a relaxing work environment or design tools to reduce technostressors. Managers can institute more daily breaks and ensure that employees have autonomy over when to take breaks and what they do during their break time. We also encourage executives to avoid using information and communication technologies to technologically invade the lives and personal time of employees in the evening after work. Second, to reduce the incidence of daily cyberdeviance, managers should offer assistance programs to their employees to teach them how to control or manage their emotional and cognitive resources and to better cope with techno-overload and techno-invasion. Third, the moderating effect of technology self-efficacy suggests that there are added benefits to selecting and training employees with high technology self-efficacy, as doing so not only helps employees to cope with techno-overload but also enables them to regulate their immediate emotions rather than engage in daily cyberdeviance at work.
{"title":"Understanding the Dynamic and Episodic Nature of Technostressors and Their Effects on Cyberdeviance: A Daily Field Investigation","authors":"Yang Chen, Jose Benitez, Christy M. K. Cheung","doi":"10.1287/isre.2020.0273","DOIUrl":"https://doi.org/10.1287/isre.2020.0273","url":null,"abstract":"From a management perspective, our results first reveal the detrimental impacts of daily technostressors on the functioning of an organization and its employees. Managers should be cognizant of these consequences and create a relaxing work environment or design tools to reduce technostressors. Managers can institute more daily breaks and ensure that employees have autonomy over when to take breaks and what they do during their break time. We also encourage executives to avoid using information and communication technologies to technologically invade the lives and personal time of employees in the evening after work. Second, to reduce the incidence of daily cyberdeviance, managers should offer assistance programs to their employees to teach them how to control or manage their emotional and cognitive resources and to better cope with techno-overload and techno-invasion. Third, the moderating effect of technology self-efficacy suggests that there are added benefits to selecting and training employees with high technology self-efficacy, as doing so not only helps employees to cope with techno-overload but also enables them to regulate their immediate emotions rather than engage in daily cyberdeviance at work.","PeriodicalId":48411,"journal":{"name":"Information Systems Research","volume":"29 1","pages":""},"PeriodicalIF":4.9,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141526504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Organizations worldwide face critical concerns related to cybersecurity threats and information security policy (ISP) compliance. Even though humans are the weakest link in the cybersecurity chain, information security professionals understand the importance of promoting individual information security behaviors because employees are also the first line of defense against ever-increasing cyber threats. Despite a recent trend of working from home, organizations do not make significant differences in their information security interventions for remote workers, relying mainly on VPNs as the only used tool, essentially making employees follow in-office standard information security policies because they are “virtually in-office.” Our study suggests that organizations need to recognize the unique context of remote work and consider personal motivations when shaping information security practices. Furthermore, our study indicates that in order to motivate remote employees to follow secure information security practices, organizations should consider personal characteristics instead of focusing on generic interventions. For instance, our study compares onsite and remote workers, suggesting that personal values are more relevant in remote work settings. Our findings exemplify just one of the many potential personal characteristics to be considered, highlighting how personal values are important motivators for ISP compliance and how they differ for onsite and remote workers in their importance when following information security rules.
{"title":"Promoting Security Behaviors in Remote Work Environments: Personal Values Shaping Information Security Policy Compliance","authors":"Carlos I. Torres, Robert E. Crossler","doi":"10.1287/isre.2021.0563","DOIUrl":"https://doi.org/10.1287/isre.2021.0563","url":null,"abstract":"Organizations worldwide face critical concerns related to cybersecurity threats and information security policy (ISP) compliance. Even though humans are the weakest link in the cybersecurity chain, information security professionals understand the importance of promoting individual information security behaviors because employees are also the first line of defense against ever-increasing cyber threats. Despite a recent trend of working from home, organizations do not make significant differences in their information security interventions for remote workers, relying mainly on VPNs as the only used tool, essentially making employees follow in-office standard information security policies because they are “virtually in-office.” Our study suggests that organizations need to recognize the unique context of remote work and consider personal motivations when shaping information security practices. Furthermore, our study indicates that in order to motivate remote employees to follow secure information security practices, organizations should consider personal characteristics instead of focusing on generic interventions. For instance, our study compares onsite and remote workers, suggesting that personal values are more relevant in remote work settings. Our findings exemplify just one of the many potential personal characteristics to be considered, highlighting how personal values are important motivators for ISP compliance and how they differ for onsite and remote workers in their importance when following information security rules.","PeriodicalId":48411,"journal":{"name":"Information Systems Research","volume":"26 1","pages":""},"PeriodicalIF":4.9,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141526505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}