Pub Date : 2025-05-29DOI: 10.1016/j.ijinfomgt.2025.102933
Jingzhu Hong , Barney Tan , Evelyn Ng , Robert M. Davison , Louie Wong
As organisational employees increasingly turn to social media for online guanxi development, uncovering how different types of social media contribute to interpersonal relationships (guanxi) becomes paramount. This study investigates digital guanxi in Chinese organisations by applying technology affordance theory to explore the complementary roles of various social media platforms. Our focus is on how these platforms shape both instrumental and affective dimensions of guanxi among employees. By conducting a case study with an exploratory approach, this study presents a theoretical framework elucidating how social media influences the formation of digital guanxi in the workplace. The findings indicate that enterprise social media (ESM) features enhance identity visibility, association, and knowledge sharing, thereby promoting instrumental guanxi by facilitating identity-based trustworthiness (xinyong), understanding, reciprocity, and professional reputation. Conversely, public social media (PSM) features foster social presence, interactivity, and self-presentation, bolstering affective guanxi by enhancing affinity-based trustworthiness (xinyong), intimacy, altruism, and social image. This research provides theoretical and practical insights into the distinct pathways through which social media contributes to guanxi development, offering a comprehensive framework for grasping the diverse aspects of digital guanxi within modern organisational contexts.
{"title":"The impact of social media on digital guanxi development in the Chinese workplace: A technology affordance perspective","authors":"Jingzhu Hong , Barney Tan , Evelyn Ng , Robert M. Davison , Louie Wong","doi":"10.1016/j.ijinfomgt.2025.102933","DOIUrl":"10.1016/j.ijinfomgt.2025.102933","url":null,"abstract":"<div><div>As organisational employees increasingly turn to social media for online guanxi development, uncovering how different types of social media contribute to interpersonal relationships (guanxi) becomes paramount. This study investigates digital guanxi in Chinese organisations by applying technology affordance theory to explore the complementary roles of various social media platforms. Our focus is on how these platforms shape both instrumental and affective dimensions of guanxi among employees. By conducting a case study with an exploratory approach, this study presents a theoretical framework elucidating how social media influences the formation of digital guanxi in the workplace. The findings indicate that enterprise social media (ESM) features enhance identity visibility, association, and knowledge sharing, thereby promoting instrumental guanxi by facilitating identity-based trustworthiness (xinyong), understanding, reciprocity, and professional reputation. Conversely, public social media (PSM) features foster social presence, interactivity, and self-presentation, bolstering affective guanxi by enhancing affinity-based trustworthiness (xinyong), intimacy, altruism, and social image. This research provides theoretical and practical insights into the distinct pathways through which social media contributes to guanxi development, offering a comprehensive framework for grasping the diverse aspects of digital guanxi within modern organisational contexts.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102933"},"PeriodicalIF":20.1,"publicationDate":"2025-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144167402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-27DOI: 10.1016/j.ijinfomgt.2025.102928
Tin Trung Nguyen , Van Thi Thanh Tran , Eldrin Hermoso , Minh Tu Tran Hoang
Drawing on learned helplessness theory and privacy calculus theory, this research investigates how privacy helplessness influences citizens’ benefit-privacy trade-offs in using electronic identification (eID) apps. Using Vietnam as a research context, potential eID app users were surveyed to uncover how a sense of privacy helplessness influences their eID app usage decisions. Findings from the partial least squares structural equation modeling showed that individuals engage in benefit-privacy trade-offs when deciding to install the app, and that privacy helplessness moderated the relationships between hedonic value and perceived benefit, and between usage likelihood and anticipated well-being. These results indicate that citizens experiencing high privacy helplessness derive greater enjoyment from using eID apps and anticipate improvements in their subjective well-being. Fuzzy-set qualitative comparative analysis (fsQCA) further revealed that individuals are willing to use eID apps despite privacy concerns and limited perceived value, suggesting that privacy helplessness can supplant perceived benefit in the benefit-privacy equation. FsQCA also showed that a lack of perceived utilitarian value is a key deterrent to eID app usage. This research contributes to theory by elucidating the role of privacy helplessness in benefit-privacy trade-offs. Specifically, while prior work focuses on the negative outcomes of helplessness, our findings highlight its potential to shift citizens’ attention towards hedonic value and anticipated well-being. Furthermore, this study proposes a reconsideration of the theoretical focus, suggesting that technology adoption may signify resignation to protection measures instead of pure acceptance. The research concludes with practical recommendations for ethical strategies to promote eID app usage rather than capitalizing on privacy helplessness.
{"title":"Feeling good about letting go? Learned helplessness and privacy calculus in citizen acceptance of electronic identification apps","authors":"Tin Trung Nguyen , Van Thi Thanh Tran , Eldrin Hermoso , Minh Tu Tran Hoang","doi":"10.1016/j.ijinfomgt.2025.102928","DOIUrl":"10.1016/j.ijinfomgt.2025.102928","url":null,"abstract":"<div><div>Drawing on learned helplessness theory and privacy calculus theory, this research investigates how privacy helplessness influences citizens’ benefit-privacy trade-offs in using electronic identification (eID) apps. Using Vietnam as a research context, potential eID app users were surveyed to uncover how a sense of privacy helplessness influences their eID app usage decisions. Findings from the partial least squares structural equation modeling showed that individuals engage in benefit-privacy trade-offs when deciding to install the app, and that privacy helplessness moderated the relationships between hedonic value and perceived benefit, and between usage likelihood and anticipated well-being. These results indicate that citizens experiencing high privacy helplessness derive greater enjoyment from using eID apps and anticipate improvements in their subjective well-being. Fuzzy-set qualitative comparative analysis (fsQCA) further revealed that individuals are willing to use eID apps despite privacy concerns and limited perceived value, suggesting that privacy helplessness can supplant perceived benefit in the benefit-privacy equation. FsQCA also showed that a lack of perceived utilitarian value is a key deterrent to eID app usage. This research contributes to theory by elucidating the role of privacy helplessness in benefit-privacy trade-offs. Specifically, while prior work focuses on the negative outcomes of helplessness, our findings highlight its potential to shift citizens’ attention towards hedonic value and anticipated well-being. Furthermore, this study proposes a reconsideration of the theoretical focus, suggesting that technology adoption may signify resignation to protection measures instead of pure acceptance. The research concludes with practical recommendations for ethical strategies to promote eID app usage rather than capitalizing on privacy helplessness.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102928"},"PeriodicalIF":20.1,"publicationDate":"2025-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144139300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AI and smart technologies are increasingly embedded in almost all aspects of everyday life, and their usage might inevitably affect individuals’ self-concept and psychological and social well-being. Evidently, cross-national and longitudinal analyses of this phenomenon and its mediating factors are required. To this end, our study examined how in-group identification with new technology users influences individuals’ satisfaction of the basic psychological needs of autonomy, competence, and relatedness in the context of new technology use. We used longitudinal two-wave data collected from 18- to 75-year-old adult populations in Finland (N = 1541), France (N = 1561), Germany (N = 1529), Ireland (N = 1112), Italy (N = 1530), and Poland (N = 1533). Based on hybrid multilevel regression models, we found consistent evidence across these six European countries that individuals’ in-group identification with new technology users is positively associated with relatedness but negatively associated with autonomy and competence. Our results suggest that the level of social identification with other technology users is a meaningful social context that shapes the well-being outcomes of new technologies.
{"title":"Technological identity and basic psychological needs in the use of new technologies: A two-wave cross-national survey study","authors":"Moona Heiskari , Magdalena Celuch , Aki Koivula , Iina Savolainen , Atte Oksanen","doi":"10.1016/j.ijinfomgt.2025.102926","DOIUrl":"10.1016/j.ijinfomgt.2025.102926","url":null,"abstract":"<div><div>AI and smart technologies are increasingly embedded in almost all aspects of everyday life, and their usage might inevitably affect individuals’ self-concept and psychological and social well-being. Evidently, cross-national and longitudinal analyses of this phenomenon and its mediating factors are required. To this end, our study examined how in-group identification with new technology users influences individuals’ satisfaction of the basic psychological needs of autonomy, competence, and relatedness in the context of new technology use. We used longitudinal two-wave data collected from 18- to 75-year-old adult populations in Finland (<em>N</em> = 1541), France (<em>N</em> = 1561), Germany (<em>N</em> = 1529), Ireland (<em>N</em> = 1112), Italy (<em>N</em> = 1530), and Poland <em>(N</em> = 1533). Based on hybrid multilevel regression models, we found consistent evidence across these six European countries that individuals’ in-group identification with new technology users is positively associated with relatedness but negatively associated with autonomy and competence. Our results suggest that the level of social identification with other technology users is a meaningful social context that shapes the well-being outcomes of new technologies.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102926"},"PeriodicalIF":20.1,"publicationDate":"2025-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144115635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-21DOI: 10.1016/j.ijinfomgt.2025.102931
Paras Bhatt , Rohit Valecha , H. Raghav Rao
{"title":"Corrigendum to “Situational awareness about data breaches and ransomware attacks: A multi-dimensional cyber threat impact framework and content analyses of practitioner-public discourses” [International Journal of Information Management 83 (2025) 102902]","authors":"Paras Bhatt , Rohit Valecha , H. Raghav Rao","doi":"10.1016/j.ijinfomgt.2025.102931","DOIUrl":"10.1016/j.ijinfomgt.2025.102931","url":null,"abstract":"","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102931"},"PeriodicalIF":20.1,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144614382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-20DOI: 10.1016/j.ijinfomgt.2025.102917
Hugo Michou, Jean-Loup Richet
This longitudinal study was conducted to investigate the emergence of strategic misalignment within a large supply system during a digital transformation initiative at the world’s largest tourism company. We explored the interplay between emergent strategic misalignments, the inherent complexity of the supply network, and their impact on the success of digital transformation. Using the complex adaptive supply network (CASN) theoretical perspective, we analyzed the complexity within the network’s internal environment. Our two case studies revealed the intricate relationships among agents within a complex organization operating as a supply network. This research contributes to the CASN literature, particularly within the tourism industry, by conceptualizing the multiple facets of complexity in supply network and unveiling the emerging causes of strategic misalignment.
{"title":"Digital transformation, emergence and complexity in supply networks","authors":"Hugo Michou, Jean-Loup Richet","doi":"10.1016/j.ijinfomgt.2025.102917","DOIUrl":"10.1016/j.ijinfomgt.2025.102917","url":null,"abstract":"<div><div>This longitudinal study was conducted to investigate the emergence of strategic misalignment within a large supply system during a digital transformation initiative at the world’s largest tourism company. We explored the interplay between emergent strategic misalignments, the inherent complexity of the supply network, and their impact on the success of digital transformation. Using the complex adaptive supply network (CASN) theoretical perspective, we analyzed the complexity within the network’s internal environment. Our two case studies revealed the intricate relationships among agents within a complex organization operating as a supply network. This research contributes to the CASN literature, particularly within the tourism industry, by conceptualizing the multiple facets of complexity in supply network and unveiling the emerging causes of strategic misalignment.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102917"},"PeriodicalIF":20.1,"publicationDate":"2025-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144089961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-19DOI: 10.1016/j.ijinfomgt.2025.102919
Naama Ilany-Tzur , Lior Fink
Phishing has been the most common type of cybercrime in recent years. The fact that successful phishing attempts require victims to collaborate with their attackers highlights the importance of identifying factors that influence users’ avoidance behavior. Drawing from evidence that mobile users process information differently than personal computer (PC) users, this research suggests that the device used may influence users’ risk-avoidance behavior, as manifested in their tendency to avoid clicking on potentially risky messages. Indeed, three studies suggest that mobile users are more risk-avoidant than PC users. Specifically, analyzing data from a cybersecurity company regarding ∼500,000 URL requests in a sample of household networks, we show that mobile devices are less likely than PCs to access unsafe URLs. Next, in two online controlled experiments in which device and URL risk levels were randomly assigned, we show that mobile users are less likely than PC users to click on a URL in a phishing-like message. Notably, this difference is observed for lower-risk URLs, whereas PC and mobile users display similar risk-avoidance tendencies in the presence of highly risky URLs. This work contributes to the mobile use literature, as well as to developing information systems theory regarding technology-threat avoidance, by showing that the device used is a contextual factor influencing users’ susceptibility to phishing attacks.
{"title":"Device and risk-avoidance behavior in the context of cybersecurity phishing attacks","authors":"Naama Ilany-Tzur , Lior Fink","doi":"10.1016/j.ijinfomgt.2025.102919","DOIUrl":"10.1016/j.ijinfomgt.2025.102919","url":null,"abstract":"<div><div>Phishing has been the most common type of cybercrime in recent years. The fact that successful phishing attempts require victims to collaborate with their attackers highlights the importance of identifying factors that influence users’ avoidance behavior. Drawing from evidence that mobile users process information differently than personal computer (PC) users, this research suggests that the device used may influence users’ risk-avoidance behavior, as manifested in their tendency to avoid clicking on potentially risky messages. Indeed, three studies suggest that mobile users are more risk-avoidant than PC users. Specifically, analyzing data from a cybersecurity company regarding ∼500,000 URL requests in a sample of household networks, we show that mobile devices are less likely than PCs to access unsafe URLs. Next, in two online controlled experiments in which device and URL risk levels were randomly assigned, we show that mobile users are less likely than PC users to click on a URL in a phishing-like message. Notably, this difference is observed for lower-risk URLs, whereas PC and mobile users display similar risk-avoidance tendencies in the presence of highly risky URLs. This work contributes to the mobile use literature, as well as to developing information systems theory regarding technology-threat avoidance, by showing that the device used is a contextual factor influencing users’ susceptibility to phishing attacks.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102919"},"PeriodicalIF":20.1,"publicationDate":"2025-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144084586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-19DOI: 10.1016/j.ijinfomgt.2025.102927
Erol Pala , Sommer Kapitan , Patrick van Esch
Reality-enhancing technologies influence consumer decisions, yet our understanding of how consumers respond to marketing content using such technologies is nascent. We develop a scale to measure consumers’ simulated responses in reality-enhancing technology experiences, resulting in the creation of a 12-item simulated responses scale with two dimensions, simulated satiation (6 items) and simulated immersion (6 items). The analyses revealed that simulated responses is a multidimensional construct, with each dimension considered an independent scale. Consequently, simulated satiation lowers evaluations of augmented reality tools and purchase intent, yet simulated immersion raises both responses. The results reveal how content variety and exposure duration interact with simulated satiation and simulated immersion to influence consumers’ evaluations and decisions. By employing the simulated responses scale, marketing practitioners can assess the effectiveness of their reality-enhancing technology strategies. The goal is to optimize content variety and exposure duration to achieve better outcomes prior to launching a marketing campaign.
{"title":"Simulated responses in reality-enhancing technologies: Scale development and validation","authors":"Erol Pala , Sommer Kapitan , Patrick van Esch","doi":"10.1016/j.ijinfomgt.2025.102927","DOIUrl":"10.1016/j.ijinfomgt.2025.102927","url":null,"abstract":"<div><div>Reality-enhancing technologies influence consumer decisions, yet our understanding of how consumers respond to marketing content using such technologies is nascent. We develop a scale to measure consumers’ simulated responses in reality-enhancing technology experiences, resulting in the creation of a 12-item simulated responses scale with two dimensions, simulated satiation (6 items) and simulated immersion (6 items). The analyses revealed that simulated responses is a multidimensional construct, with each dimension considered an independent scale. Consequently, simulated satiation lowers evaluations of augmented reality tools and purchase intent, yet simulated immersion raises both responses. The results reveal how content variety and exposure duration interact with simulated satiation and simulated immersion to influence consumers’ evaluations and decisions. By employing the simulated responses scale, marketing practitioners can assess the effectiveness of their reality-enhancing technology strategies. The goal is to optimize content variety and exposure duration to achieve better outcomes prior to launching a marketing campaign.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102927"},"PeriodicalIF":20.1,"publicationDate":"2025-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144084522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-13DOI: 10.1016/j.ijinfomgt.2025.102918
Pantea Foroudi , Reza Marvi , Dongmei Zha
Given the limited studies on AI sensation and its impact on consumer emotional response and engagement, we investigate its impact to drive engagement. Employing a mixed-methods approach, we began with a qualitative phase consisting of 68 interviews (18 healthcare employees, 37 users of Wearable Health Devices, 7 AI developers, and 6 academics). Grounded in the theories of constructed emotion and the uncanny valley, as well as insights from the qualitative phase, we developed a robust model investigating the role of AI sensation on costumer emotional responses and engagement. This was followed by a survey of 557 healthcare employees. Data analysis was conducted using SPSS for descriptive statistics and reliability assessments, and AMOS for confirmatory factor analysis to validate the robustness of our measurement models. our findings show that AI sensation can drive customer subjective feeling state and AI affects. We also found empirical evidence that both can mediate the relationship between AI sensation, customer subjective feeling state, AI affects and activation engagement. Our findings can offer valuable understanding for managers and AI developers, underscoring the important role of AI sensation for driving engagement.
{"title":"AI sensation and engagement: Unpacking the sensory experience in human-AI interaction","authors":"Pantea Foroudi , Reza Marvi , Dongmei Zha","doi":"10.1016/j.ijinfomgt.2025.102918","DOIUrl":"10.1016/j.ijinfomgt.2025.102918","url":null,"abstract":"<div><div>Given the limited studies on AI sensation and its impact on consumer emotional response and engagement, we investigate its impact to drive engagement. Employing a mixed-methods approach, we began with a qualitative phase consisting of 68 interviews (18 healthcare employees, 37 users of Wearable Health Devices, 7 AI developers, and 6 academics). Grounded in the theories of constructed emotion and the uncanny valley, as well as insights from the qualitative phase, we developed a robust model investigating the role of AI sensation on costumer emotional responses and engagement. This was followed by a survey of 557 healthcare employees. Data analysis was conducted using SPSS for descriptive statistics and reliability assessments, and AMOS for confirmatory factor analysis to validate the robustness of our measurement models. our findings show that AI sensation can drive customer subjective feeling state and AI affects. We also found empirical evidence that both can mediate the relationship between AI sensation, customer subjective feeling state, AI affects and activation engagement. Our findings can offer valuable understanding for managers and AI developers, underscoring the important role of AI sensation for driving engagement.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102918"},"PeriodicalIF":20.1,"publicationDate":"2025-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143943716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-05DOI: 10.1016/j.ijinfomgt.2025.102912
Tung-Ju Wu , Ruo-Xi Zhang , Jia-Min Li
Although the reaction of change recipients is crucial in the successful implementation of organizational change, research on digital-intelligence transformation (DIT) neglected employees’ intentions to support DIT. Integrating the theory of planned behavior and job demands-resources model, this study presents a model that explains employees’ intention to support DIT. Derived from a preliminary interview study, we identified critical determinants that shape employees’ attitude towards DIT. We conducted a two-time point study with employees from enterprises presently undergoing DIT to test hypotheses. We found that DIT-supportive behavior is indirectly influenced by DIT-related attitude, DIT-related subjective norm and role clarity under DIT via employees’ intentions to support DIT. Our research also explored the moderating role of DIT-related perceived behavioral control. We further discuss the theoretical and practical implications of this research.
{"title":"When employees meet digital-intelligence transformation: Unveiling the role of employee intentions","authors":"Tung-Ju Wu , Ruo-Xi Zhang , Jia-Min Li","doi":"10.1016/j.ijinfomgt.2025.102912","DOIUrl":"10.1016/j.ijinfomgt.2025.102912","url":null,"abstract":"<div><div>Although the reaction of change recipients is crucial in the successful implementation of organizational change, research on digital-intelligence transformation (DIT) neglected employees’ intentions to support DIT. Integrating the theory of planned behavior and job demands-resources model, this study presents a model that explains employees’ intention to support DIT. Derived from a preliminary interview study, we identified critical determinants that shape employees’ attitude towards DIT. We conducted a two-time point study with employees from enterprises presently undergoing DIT to test hypotheses. We found that DIT-supportive behavior is indirectly influenced by DIT-related attitude, DIT-related subjective norm and role clarity under DIT via employees’ intentions to support DIT. Our research also explored the moderating role of DIT-related perceived behavioral control. We further discuss the theoretical and practical implications of this research.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102912"},"PeriodicalIF":20.1,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143903537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-05DOI: 10.1016/j.ijinfomgt.2025.102914
Thomas Anning-Dorson, Faeeza Baba, Melissa Zulu, George Acheampong
This study develops a process model of Data-Driven Dynamic Capabilities (DDDC) in African retail banking, addressing critical gaps in our understanding of how organizations develop and deploy data capabilities in data-rich, resource-constrained environments. Through a qualitative multiple case study of two major African banks, we uncover the specific practices through which banks develop capabilities despite resource constraints, deploy them to address contextual challenges, and generate competitive advantage. Our analysis reveals three interconnected processes: capability development practices (including data-driven culture cultivation, cross-functional integration, and adaptive infrastructure development); core capabilities that emerge through these practices (Data Integration and Synthesis, Real-time Insight Generation, and Agile Marketing Execution); and capability deployment practices (such as contextually adaptive customer engagement and regulatory navigation) that translate capabilities into competitive outcomes. The process model explains how contextual factors—including regulatory complexity, varying digital infrastructure, and skills constraints—shape both capability development and deployment practices. Theoretically, our study extends dynamic capabilities theory by reconceptualizing capability development as an ongoing process enacted through specific organizational practices rather than as a linear sequence of activities. It contributes to the literature on big data analytics by revealing how capabilities emerge through the interplay of organizational practices and contextual factors, challenging traditional assumptions about resource requirements for advanced analytics capabilities. By focusing on practices rather than just capabilities, our process model shows how organizations in resource-constrained environments develop innovative approaches to overcome limitations in specialized analytics talent and infrastructure. This research provides a roadmap for digital transformation in emerging markets, emphasizing the development of contextually appropriate practices rather than simply importing approaches from resource-rich environments. It sets the stage for future research on organizational adaptation in data-rich, resource-constrained environments, exploring the intersection of data analytics, dynamic capabilities, and contextual innovation.
{"title":"Data-driven dynamic capabilities in emerging markets: A grounded theory approach to digital transformation in african retail banking","authors":"Thomas Anning-Dorson, Faeeza Baba, Melissa Zulu, George Acheampong","doi":"10.1016/j.ijinfomgt.2025.102914","DOIUrl":"10.1016/j.ijinfomgt.2025.102914","url":null,"abstract":"<div><div>This study develops a process model of Data-Driven Dynamic Capabilities (DDDC) in African retail banking, addressing critical gaps in our understanding of how organizations develop and deploy data capabilities in data-rich, resource-constrained environments. Through a qualitative multiple case study of two major African banks, we uncover the specific practices through which banks develop capabilities despite resource constraints, deploy them to address contextual challenges, and generate competitive advantage. Our analysis reveals three interconnected processes: capability development practices (including data-driven culture cultivation, cross-functional integration, and adaptive infrastructure development); core capabilities that emerge through these practices (Data Integration and Synthesis, Real-time Insight Generation, and Agile Marketing Execution); and capability deployment practices (such as contextually adaptive customer engagement and regulatory navigation) that translate capabilities into competitive outcomes. The process model explains how contextual factors—including regulatory complexity, varying digital infrastructure, and skills constraints—shape both capability development and deployment practices. Theoretically, our study extends dynamic capabilities theory by reconceptualizing capability development as an ongoing process enacted through specific organizational practices rather than as a linear sequence of activities. It contributes to the literature on big data analytics by revealing how capabilities emerge through the interplay of organizational practices and contextual factors, challenging traditional assumptions about resource requirements for advanced analytics capabilities. By focusing on practices rather than just capabilities, our process model shows how organizations in resource-constrained environments develop innovative approaches to overcome limitations in specialized analytics talent and infrastructure. This research provides a roadmap for digital transformation in emerging markets, emphasizing the development of contextually appropriate practices rather than simply importing approaches from resource-rich environments. It sets the stage for future research on organizational adaptation in data-rich, resource-constrained environments, exploring the intersection of data analytics, dynamic capabilities, and contextual innovation.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102914"},"PeriodicalIF":20.1,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143903539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}