首页 > 最新文献

Mis Quarterly最新文献

英文 中文
Balancing Affordances and Constraints: Designing Enterprise Social Media for Organizational Knowledge Work 平衡承受力与制约力:为组织知识工作设计企业社交媒体
IF 7.3 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-01 DOI: 10.25300/misq/2023/16499
Hani Safadi
Enterprise social media (ESM) is changing how knowledge workers interact and share information; however, a debate persists as to whether ESM is an adequate knowledge management system. ESM provides a rich set of affordances for organizational knowledge work, such as improved organizational memory, but also constrains knowledge work performance because of digital interruptions. Extending and complementing existing scholarship, this study asks the following research question: How can organizations design ESM to realize its knowledge work benefits? Using a computational agent-based model that incorporates the design features of ESM, workers’ attitudes, and resulting ESM-use affordances and constraints, this study shows how ESM-use outcomes are contingent both on the design of and users’ attitudes toward ESM. Specifically, the negative effects of ESM interactivity are mitigated when employees have a low transparency preference and access ESM without posting as much. The study further unpacks asymmetric engagement as the mechanism that leads low transparency configurations to be more resilient to the negative effects of interruptions driven by ESM interactivity. Asymmetric engagement—learning from posted content without interacting often—enables the gradual creation of organizational memory while maintaining a broad user base by minimizing interruptions. These results ultimately contribute a multilevel model of ESM use and knowledge work outcomes, enhancing the theoretical understanding of previously studied mechanisms such as communication visibility and providing implications for organizations designing ESM.
#html-body [data-pb-style=MMV4CPM]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll} 企业社交媒体(ESM)正在改变知识工作者交互和共享信息的方式;然而,关于ESM是否是一个适当的知识管理系统的争论一直存在。ESM为组织知识工作提供了丰富的功能,如改善组织记忆,但也因数字干扰而限制了知识工作的绩效。本研究在扩展和补充现有研究成果的基础上,提出了以下研究问题:组织如何设计无害环境管理以实现其知识工作优势?本研究使用了一个基于计算代理的模型,该模型结合了无害环境管理的设计特点、工作人员的态度以及由此产生的无害环境管理使用能力和限制,展示了无害环境管理的使用结果如何取决于无害环境管理的设计和用户对无害环境管理的态度。具体来说,如果员工的透明度偏好较低,不需要发布太多信息就能访问 ESM,那么 ESM 互动性的负面影响就会减轻。这项研究进一步揭示了非对称参与的机制,这种机制导致低透明度配置更能抵御ESM互动性带来的负面影响。非对称参与--在不经常互动的情况下学习发布的内容--使组织记忆得以逐步形成,同时通过最大限度地减少中断来维持广泛的用户基础。这些结果最终为ESM的使用和知识工作成果提供了一个多层次模型,加强了对以前研究过的机制(如交流可见性)的理论理解,并为设计ESM的组织提供了启示。
{"title":"Balancing Affordances and Constraints: Designing Enterprise Social Media for Organizational Knowledge Work","authors":"Hani Safadi","doi":"10.25300/misq/2023/16499","DOIUrl":"https://doi.org/10.25300/misq/2023/16499","url":null,"abstract":"<style>#html-body [data-pb-style=MMV4CPM]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll}</style>Enterprise social media (ESM) is changing how knowledge workers interact and share information; however, a debate persists as to whether ESM is an adequate knowledge management system. ESM provides a rich set of affordances for organizational knowledge work, such as improved organizational memory, but also constrains knowledge work performance because of digital interruptions. Extending and complementing existing scholarship, this study asks the following research question: How can organizations design ESM to realize its knowledge work benefits? Using a computational agent-based model that incorporates the design features of ESM, workers’ attitudes, and resulting ESM-use affordances and constraints, this study shows how ESM-use outcomes are contingent both on the design of and users’ attitudes toward ESM. Specifically, the negative effects of ESM interactivity are mitigated when employees have a low transparency preference and access ESM without posting as much. The study further unpacks asymmetric engagement as the mechanism that leads low transparency configurations to be more resilient to the negative effects of interruptions driven by ESM interactivity. Asymmetric engagement—learning from posted content without interacting often—enables the gradual creation of organizational memory while maintaining a broad user base by minimizing interruptions. These results ultimately contribute a multilevel model of ESM use and knowledge work outcomes, enhancing the theoretical understanding of previously studied mechanisms such as communication visibility and providing implications for organizations designing ESM.","PeriodicalId":49807,"journal":{"name":"Mis Quarterly","volume":"3 1","pages":""},"PeriodicalIF":7.3,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140015673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual Pathways of Value Creation from Digital Strategic Posture: Contingent Effects of Competitive Actions and Environmental Uncertainty 数字战略态势创造价值的双重途径:竞争行动和环境不确定性的权变效应
IF 7.3 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-01 DOI: 10.25300/misq/2023/16470
Inmyung Choi, David E. Cantor, Kunsoo Han, Joey F. George
Digital strategic posture (DSP) is defined as a firm’s overall strategic stance toward investing in information technology (IT) initiatives relative to that of rival firms. This study examines how a firm’s DSP affects firm performance. Drawing on the competitive dynamics perspective and contingency view, we demonstrate that DSP influences competitive actions through dual pathways. First, DSP enables firms to take competitive actions that are more appropriate given the level of environmental uncertainty (captured by industry dynamism). In particular, our findings suggest that a proactive DSP enables relatively more innovation-oriented actions in dynamic industries while enabling relatively more operations-oriented actions in less dynamic industries. Second, DSP plays a facilitating role in firms’ execution of competitive actions such that a firm’s value from its proactive DSP is enhanced when there is a fit between the type of the firm’s competitive actions and its level of environmental uncertainty. Specifically, we find that firms with a more proactive DSP achieve superior firm performance from innovation-oriented actions in dynamic industries and from operations-oriented actions in less dynamic industries. Taken together, our findings suggest that a proactive DSP not only allows firms to take appropriate competitive actions that fit their environmental conditions but also contributes to firms’ performance by facilitating the execution of these appropriate actions, thus enhancing their efficacy.
#html-body [data-pb-style=V0XPLF9]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll} 数字化战略态势(Digital strategic posture,DSP)是指企业在信息技术(IT)投资方面相对于竞争对手的整体战略态势。本研究探讨了企业的 DSP 如何影响企业绩效。借鉴竞争动力学观点和权变观点,我们证明 DSP 通过双重途径影响竞争行动。首先,DSP 使企业能够采取与环境不确定性水平(由行业动态反映)相适应的竞争行动。特别是,我们的研究结果表明,积极主动的 DSP 在动态行业中能使企业采取相对更多的以创新为导向的行动,而在动态较弱的行业中则能使企业采取相对更多的以运营为导向的行动。其次,DSP 对企业执行竞争行动起到促进作用,当企业的竞争行动类型与环境不确定性水平相匹配时,企业主动的 DSP 价值就会提高。具体而言,我们发现,在动态行业中,具有更积极主动的DSP的企业通过以创新为导向的行动取得了更优越的企业绩效,而在动态较弱的行业中,则通过以运营为导向的行动取得了更优越的企业绩效。综合来看,我们的研究结果表明,积极主动的DSP不仅能让企业采取适合其环境条件的适当竞争行动,还能通过促进这些适当行动的实施来提高企业绩效,从而增强其功效。
{"title":"Dual Pathways of Value Creation from Digital Strategic Posture: Contingent Effects of Competitive Actions and Environmental Uncertainty","authors":"Inmyung Choi, David E. Cantor, Kunsoo Han, Joey F. George","doi":"10.25300/misq/2023/16470","DOIUrl":"https://doi.org/10.25300/misq/2023/16470","url":null,"abstract":"<style>#html-body [data-pb-style=V0XPLF9]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll}</style>Digital strategic posture (DSP) is defined as a firm’s overall strategic stance toward investing in information technology (IT) initiatives relative to that of rival firms. This study examines how a firm’s DSP affects firm performance. Drawing on the competitive dynamics perspective and contingency view, we demonstrate that DSP influences competitive actions through dual pathways. First, DSP enables firms to take competitive actions that are more appropriate given the level of environmental uncertainty (captured by industry dynamism). In particular, our findings suggest that a proactive DSP enables relatively more innovation-oriented actions in dynamic industries while enabling relatively more operations-oriented actions in less dynamic industries. Second, DSP plays a facilitating role in firms’ execution of competitive actions such that a firm’s value from its proactive DSP is enhanced when there is a fit between the type of the firm’s competitive actions and its level of environmental uncertainty. Specifically, we find that firms with a more proactive DSP achieve superior firm performance from innovation-oriented actions in dynamic industries and from operations-oriented actions in less dynamic industries. Taken together, our findings suggest that a proactive DSP not only allows firms to take appropriate competitive actions that fit their environmental conditions but also contributes to firms’ performance by facilitating the execution of these appropriate actions, thus enhancing their efficacy.","PeriodicalId":49807,"journal":{"name":"Mis Quarterly","volume":"32 1","pages":""},"PeriodicalIF":7.3,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140015597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Users Drive Value in Two-Sided Markets: Platform Designs That Matter 用户如何在双面市场中创造价值:重要的平台设计
IF 7.3 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-01 DOI: 10.25300/misq/2023/17012
Zhou Zhou, Lingling Zhang, Marshall Van. Alstyne
Extant research has popularized the perspective that strong network effects produce “winner-take-all” outcomes, which leads platforms to invest in user growth and encourages investors to subsidize these platforms. However, user growth does not necessarily imply strong user stickiness. Without user stickiness, strong network effects in the current period may fade in future periods, thus rendering a user growth strategy ineffective. By adding a time dimension to network effects, we developed a model of cross-period and within-period network effects to explain how different types of network effects drive value. We emphasize that the cross-period same-side network effect contributes to user stickiness, while the within-period cross-side network effect persists conditional on user stickiness. We propose that one reason for platforms having heterogeneous cross-period same-side network effects is because of the “product learning” mechanism: it is expected that products with higher uncertainty have a stronger cross-period same-side network effect. Based on different drivers, we extend the customer lifetime value model (CLV2) to two-sided platform markets, allowing us to measure how different interventions drive platform value. Using Groupon data, we verify our insights and discuss platform design choices that enhance user stickiness when the cross-period same-side network effect is weak.
#html-body [data-pb-style=T2VF659]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll} 目前的研究普遍认为,强大的网络效应会产生 "赢家通吃 "的结果,从而促使平台投资于用户增长,并鼓励投资者为这些平台提供补贴。然而,用户增长并不一定意味着强大的用户粘性。如果没有用户粘性,当期的强大网络效应在未来可能会消退,从而使用户增长战略失效。通过为网络效应添加时间维度,我们建立了跨期和期内网络效应模型,以解释不同类型的网络效应如何驱动价值。我们强调,跨期同侧网络效应有助于增强用户粘性,而期内跨侧网络效应则以用户粘性为条件持续存在。我们认为,平台具有异质性跨期同侧网络效应的一个原因是 "产品学习 "机制:不确定性较高的产品具有更强的跨期同侧网络效应。基于不同的驱动因素,我们将客户终身价值模型(CLV2)扩展到了双面平台市场,从而可以衡量不同的干预措施是如何驱动平台价值的。利用 Groupon 数据,我们验证了我们的见解,并讨论了当跨期同侧网络效应较弱时,可增强用户粘性的平台设计选择。
{"title":"How Users Drive Value in Two-Sided Markets: Platform Designs That Matter","authors":"Zhou Zhou, Lingling Zhang, Marshall Van. Alstyne","doi":"10.25300/misq/2023/17012","DOIUrl":"https://doi.org/10.25300/misq/2023/17012","url":null,"abstract":"<style>#html-body [data-pb-style=T2VF659]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll}</style>Extant research has popularized the perspective that strong network effects produce “winner-take-all” outcomes, which leads platforms to invest in user growth and encourages investors to subsidize these platforms. However, user growth does not necessarily imply strong user stickiness. Without user stickiness, strong network effects in the current period may fade in future periods, thus rendering a user growth strategy ineffective. By adding a time dimension to network effects, we developed a model of cross-period and within-period network effects to explain how different types of network effects drive value. We emphasize that the cross-period same-side network effect contributes to user stickiness, while the within-period cross-side network effect persists conditional on user stickiness. We propose that one reason for platforms having heterogeneous cross-period same-side network effects is because of the “product learning” mechanism: it is expected that products with higher uncertainty have a stronger cross-period same-side network effect. Based on different drivers, we extend the customer lifetime value model (CLV2) to two-sided platform markets, allowing us to measure how different interventions drive platform value. Using Groupon data, we verify our insights and discuss platform design choices that enhance user stickiness when the cross-period same-side network effect is weak.","PeriodicalId":49807,"journal":{"name":"Mis Quarterly","volume":"27 1","pages":""},"PeriodicalIF":7.3,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140015704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Digital Nudges to Enhance Collective Intelligence in Online Collaboration: Insights from Unexpected Outcomes 使用数字提示增强在线协作中的集体智慧:意外结果的启示
IF 7.3 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-01 DOI: 10.25300/misq/2023/16752
Pranav Gupta, Young Ji Kim, Ella Glikson, Anita Williams Woolley
The dramatic expansion of internet communication tools has led to the increased use of temporary online groups to solve problems, provide services, or produce new knowledge. However, many of these groups need help to collaborate effectively. The rapid development of new tools and collaboration forms requires ongoing experimentation to develop and test new ways to support this novel form of teamwork. Building on research demonstrating the use of nudges to shape behavior, we report the results of an experiment to nudge teamwork in 168 temporary online groups randomly assigned to one of four different nudge treatments. Each nudge was designed to spur one of three targeted collaborative processes (collaborator skill use, effective task strategy, and the level of collective effort) demonstrated to enhance collective intelligence in extant research. Our results support the basic notion that digitally nudging collaborative processes can improve collective intelligence. However, to our surprise, a couple of nudges had unintended negative effects and ultimately decreased collective intelligence. We discuss our results using structured speculation to systematically consider the conditions under which we would or would not expect the same patterns to materialize in order to clearly articulate directions for future research.
#html-body[data-pb-style=F1YMG1X]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left-top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll}互联网通信工具的急剧扩展导致越来越多地使用临时在线群组来解决问题、提供服务或产生新知识。然而,许多这类群组需要帮助才能有效协作。新工具和协作形式的快速发展要求不断进行实验,以开发和测试支持这种新型团队协作的新方法。在研究证明使用暗示可以塑造行为的基础上,我们报告了在 168 个随机分配到四种不同暗示处理方法之一的临时在线小组中进行团队合作暗示实验的结果。每种提示都旨在刺激三个目标协作过程(协作者技能的使用、有效的任务策略和集体努力的水平)中的一个过程,这三个过程在现有研究中被证明可以提高集体智慧。我们的研究结果支持这样一个基本概念,即对协作过程进行数字提示可以提高集体智慧。然而,出乎我们意料的是,有几项激励措施产生了意想不到的负面影响,最终降低了集体智慧。我们利用结构化推测对结果进行了讨论,系统地考虑了在哪些条件下我们会或不会出现相同的模式,以便明确阐述未来的研究方向。
{"title":"Using Digital Nudges to Enhance Collective Intelligence in Online Collaboration: Insights from Unexpected Outcomes","authors":"Pranav Gupta, Young Ji Kim, Ella Glikson, Anita Williams Woolley","doi":"10.25300/misq/2023/16752","DOIUrl":"https://doi.org/10.25300/misq/2023/16752","url":null,"abstract":"<style>#html-body [data-pb-style=F1YMG1X]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll}</style>The dramatic expansion of internet communication tools has led to the increased use of temporary online groups to solve problems, provide services, or produce new knowledge. However, many of these groups need help to collaborate effectively. The rapid development of new tools and collaboration forms requires ongoing experimentation to develop and test new ways to support this novel form of teamwork. Building on research demonstrating the use of nudges to shape behavior, we report the results of an experiment to nudge teamwork in 168 temporary online groups randomly assigned to one of four different nudge treatments. Each nudge was designed to spur one of three targeted collaborative processes (collaborator skill use, effective task strategy, and the level of collective effort) demonstrated to enhance collective intelligence in extant research. Our results support the basic notion that digitally nudging collaborative processes can improve collective intelligence. However, to our surprise, a couple of nudges had unintended negative effects and ultimately decreased collective intelligence. We discuss our results using structured speculation to systematically consider the conditions under which we would or would not expect the same patterns to materialize in order to clearly articulate directions for future research.","PeriodicalId":49807,"journal":{"name":"Mis Quarterly","volume":"22 1","pages":""},"PeriodicalIF":7.3,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140018928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Skin in the Game: The Transformational Potential of Decentralized Autonomous Organizations 亲身参与游戏:权力下放型自治组织的转型潜力
IF 7.3 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-01 DOI: 10.25300/misq/2023/17690
Eleunthia Wong Ellinger, Robert Wayne Gregory, Tobias Mini, Thomas Widjaja, Ola Henfridsson
Decentralized autonomous organizations (DAOs)—collectively owned human-machine systems deployed on a blockchain that self-govern through smart contracts and the voluntary contributions of autonomous community members—exhibit the potential to facilitate collective action in managing digital commons. Yet the promise of decentralization and collective action is difficult to sustain. To this end, this paper critically examines the transformational potential of DAOs in the case of decentralized finance. Using a polycentric governance lens, we contribute to the literature on technology-enabled forms of organizing with a model explaining the transformational potential of DAOs to facilitate collective action in digital commons. Our study highlights that (1) DAOs are a new form of organizing enabled by blockchain technology in which individuals are free to pursue their objectives within a general system of rules enforced by smart contracts, (2) collective action for managing digital commons can be sustained through a set of three mechanisms—sustained participation, collective direction, and scaled organizing, and (3) DAOs tend to strike a balance between centralized and fully decentralized or community-based governance by implementing a polycentric governance system involving a combination of human and machine agency that creates skin in the game.
#html-body [data-pb-style=GXH662Y]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll}去中心化自治组织(DAOs)--部署在区块链上的集体所有的人机系统,通过智能合约和自治社区成员的自愿贡献进行自我管理--展示了促进集体行动管理数字公域的潜力。然而,去中心化和集体行动的承诺很难持久。为此,本文以去中心化金融为例,批判性地研究了 DAOs 的变革潜力。利用多中心治理视角,我们通过一个模型解释了 DAO 在促进数字公地集体行动方面的转型潜力,为有关技术驱动的组织形式的文献做出了贡献。我们的研究强调:(1) DAO 是区块链技术促成的一种新的组织形式,在这种组织形式中,个人可以在智能合约执行的通用规则体系内自由追求自己的目标;(2) 管理数字公域的集体行动可以通过一系列三种机制来维持--持续参与、集体指导和规模化组织;(3) DAO 倾向于通过实施多中心治理系统,在中心化治理和完全去中心化治理或基于社区的治理之间取得平衡,这种多中心治理系统涉及人类和机器机构的结合,从而在游戏中创造出利益。
{"title":"Skin in the Game: The Transformational Potential of Decentralized Autonomous Organizations","authors":"Eleunthia Wong Ellinger, Robert Wayne Gregory, Tobias Mini, Thomas Widjaja, Ola Henfridsson","doi":"10.25300/misq/2023/17690","DOIUrl":"https://doi.org/10.25300/misq/2023/17690","url":null,"abstract":"<style>#html-body [data-pb-style=GXH662Y]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll}</style>Decentralized autonomous organizations (DAOs)—collectively owned human-machine systems deployed on a blockchain that self-govern through smart contracts and the voluntary contributions of autonomous community members—exhibit the potential to facilitate collective action in managing digital commons. Yet the promise of decentralization and collective action is difficult to sustain. To this end, this paper critically examines the transformational potential of DAOs in the case of decentralized finance. Using a polycentric governance lens, we contribute to the literature on technology-enabled forms of organizing with a model explaining the transformational potential of DAOs to facilitate collective action in digital commons. Our study highlights that (1) DAOs are a new form of organizing enabled by blockchain technology in which individuals are free to pursue their objectives within a general system of rules enforced by smart contracts, (2) collective action for managing digital commons can be sustained through a set of three mechanisms—sustained participation, collective direction, and scaled organizing, and (3) DAOs tend to strike a balance between centralized and fully decentralized or community-based governance by implementing a polycentric governance system involving a combination of human and machine agency that creates skin in the game.","PeriodicalId":49807,"journal":{"name":"Mis Quarterly","volume":"10 1","pages":""},"PeriodicalIF":7.3,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140015687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Entrainment of Task Allocation and Release Cycles in Open Source Software Development 开源软件开发中任务分配和发布周期的约束
IF 7.3 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-01 DOI: 10.25300/misq/2023/16789
Aron Lindberg, Aaron Schecter, Nicholas Berente, Phil Hennel, Kalle Lyytinen
In this study we identify a process of “entrainment” around open source software (OSS) development release cycles to capture patterns of self-organized task allocation among developers. We conducted an abductive, computationally intensive study of eight OSS projects, using relational event modeling to analyze 1,169,489 actions covering 93 major software releases. The process of entrainment that we identify involves three task allocation mechanisms: (1) developer-issue inertia, (2) developer contribution frequency, and (3) issue popularity. Our analysis demonstrates that these mechanisms and the phases of the release cycle entrain each other. Before a major release, developers engage in a concentrated mobilization phase, whereby they democratize development activity and increasingly allocate community contributions to the set of issues related to the release. After a major release, the extended cleanup phase garners a greater share of development work from recently highly active developers and dilutes the activity of these developers across a wider range of issues. Our theorizing suggests that major releases constitute important events around which OSS communities self-organize and we characterize how this occurs. Our research contributes to theorizing on organizing in OSS communities by explaining how self-organizing task allocation interacts with release cycles through the mechanism of entrainment. We also contribute to the literature on entrainment by showing how it may unfold in the context of online peer production communities such as OSS.
#html-body [data-pb-style=FOXJBQ7]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll} 在这项研究中,我们围绕开源软件(OSS)开发发布周期确定了一个 "诱导 "过程,以捕捉开发人员之间自组织任务分配的模式。我们对八个开放源码软件项目进行了归纳式计算密集型研究,使用关系事件建模分析了 93 个主要软件版本中的 1,169,489 个操作。我们确定的诱导过程涉及三种任务分配机制:(1) 开发人员-问题惯性;(2) 开发人员贡献频率;(3) 问题流行度。我们的分析表明,这些机制与发布周期的各个阶段相互制约。在重大版本发布之前,开发人员会进入一个集中动员阶段,他们会将开发活动民主化,并将越来越多的社区贡献分配给与版本发布相关的一系列问题。在重大版本发布后,扩展清理阶段会从近期高度活跃的开发者那里获得更大份额的开发工作,并在更广泛的问题上稀释这些开发者的活动。我们的理论研究表明,重大版本构成了开放源码软件社区自我组织的重要事件,我们也描述了这是如何发生的。我们的研究通过解释自组织任务分配如何通过诱导机制与发布周期相互作用,为开放源码软件社区的组织理论做出了贡献。我们还展示了夹带机制如何在开放源码软件等在线同行生产社区中展开,从而为有关夹带机制的文献做出了贡献。
{"title":"The Entrainment of Task Allocation and Release Cycles in Open Source Software Development","authors":"Aron Lindberg, Aaron Schecter, Nicholas Berente, Phil Hennel, Kalle Lyytinen","doi":"10.25300/misq/2023/16789","DOIUrl":"https://doi.org/10.25300/misq/2023/16789","url":null,"abstract":"<style>#html-body [data-pb-style=FOXJBQ7]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll}</style>In this study we identify a process of “entrainment” around open source software (OSS) development release cycles to capture patterns of self-organized task allocation among developers. We conducted an abductive, computationally intensive study of eight OSS projects, using relational event modeling to analyze 1,169,489 actions covering 93 major software releases. The process of entrainment that we identify involves three task allocation mechanisms: (1) developer-issue inertia, (2) developer contribution frequency, and (3) issue popularity. Our analysis demonstrates that these mechanisms and the phases of the release cycle entrain each other. Before a major release, developers engage in a concentrated mobilization phase, whereby they democratize development activity and increasingly allocate community contributions to the set of issues related to the release. After a major release, the extended cleanup phase garners a greater share of development work from recently highly active developers and dilutes the activity of these developers across a wider range of issues. Our theorizing suggests that major releases constitute important events around which OSS communities self-organize and we characterize how this occurs. Our research contributes to theorizing on organizing in OSS communities by explaining how self-organizing task allocation interacts with release cycles through the mechanism of entrainment. We also contribute to the literature on entrainment by showing how it may unfold in the context of online peer production communities such as OSS.","PeriodicalId":49807,"journal":{"name":"Mis Quarterly","volume":"53 1","pages":""},"PeriodicalIF":7.3,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140015574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time Will Tell: The Case for an Idiographic Approach to Behavioral Cybersecurity Research 时间会证明一切:行为网络安全研究中的成语方法案例
IF 7.3 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-01 DOI: 10.25300/misq/2023/17707
W. Alec Cram, John D'Arcy, Alexander Benlian
Many of the theories used in behavioral cybersecurity research have been applied with a nomothetic approach, which is characterized by cross-sectional data (e.g., one-time surveys) that identify patterns across a population of individuals. Although this can provide valuable between-person, point-in-time insights (e.g., employees who use neutralization techniques, such as denying responsibility for cybersecurity policy violations, tend to comply less), it is unable to reveal within-person patterns that account for varying experiences and situations over time. This paper articulates why an idiographic approach, which undertakes a within-person analysis of longitudinal data, can: (1) help validate widely used theories in behavioral cybersecurity research that imply patterns of behavior within a given person over time and (2) provide distinct theoretical insights on behavioral cybersecurity phenomena by accounting for such within-person patterns. To these ends, we apply an idiographic approach to an established theory in behavioral cybersecurity research—neutralization theory—and empirically test a within-person variant of this theory using a four-week experience sampling study. Our results support a more granular application of neutralization theory in the cybersecurity context that considers the behavior of a given person over time. We conclude the paper by highlighting the contexts and theories that provide the most promising opportunities for future behavioral cybersecurity research using an idiographic approach.
#html-body [data-pb-style=K5SA9L3]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll} 行为网络安全研究中使用的许多理论都是采用提名方法,这种方法的特点是使用横截面数据(如一次性调查)来识别整个群体的模式。虽然这种方法可以提供有价值的人与人之间、时间点之间的见解(例如,使用中和技术(如否认对违反网络安全政策的责任)的员工往往较少遵守规定),但它无法揭示人与人之间的模式,无法说明随着时间的推移而变化的经历和情况。本文阐述了为什么对纵向数据进行人内分析的特异性分析方法可以:(1)有助于验证行为网络安全研究中广泛使用的理论,这些理论意味着特定人随着时间推移的行为模式;(2)通过考虑这种人内模式,为行为网络安全现象提供独特的理论见解。为此,我们对行为网络安全研究中的一个既定理论--中性化理论--采用了一种成因学方法,并通过一项为期四周的经验抽样研究对该理论的人内变体进行了实证检验。我们的研究结果支持在网络安全背景下对中和理论进行更细化的应用,即考虑特定个人在一段时间内的行为。在本文的最后,我们强调了使用成因分析方法为未来行为网络安全研究提供最有前景机会的环境和理论。
{"title":"Time Will Tell: The Case for an Idiographic Approach to Behavioral Cybersecurity Research","authors":"W. Alec Cram, John D'Arcy, Alexander Benlian","doi":"10.25300/misq/2023/17707","DOIUrl":"https://doi.org/10.25300/misq/2023/17707","url":null,"abstract":"<style>#html-body [data-pb-style=K5SA9L3]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll}</style>Many of the theories used in behavioral cybersecurity research have been applied with a nomothetic approach, which is characterized by cross-sectional data (e.g., one-time surveys) that identify patterns across a population of individuals. Although this can provide valuable between-person, point-in-time insights (e.g., employees who use neutralization techniques, such as denying responsibility for cybersecurity policy violations, tend to comply less), it is unable to reveal within-person patterns that account for varying experiences and situations over time. This paper articulates why an idiographic approach, which undertakes a within-person analysis of longitudinal data, can: (1) help validate widely used theories in behavioral cybersecurity research that imply patterns of behavior within a given person over time and (2) provide distinct theoretical insights on behavioral cybersecurity phenomena by accounting for such within-person patterns. To these ends, we apply an idiographic approach to an established theory in behavioral cybersecurity research—neutralization theory—and empirically test a within-person variant of this theory using a four-week experience sampling study. Our results support a more granular application of neutralization theory in the cybersecurity context that considers the behavior of a given person over time. We conclude the paper by highlighting the contexts and theories that provide the most promising opportunities for future behavioral cybersecurity research using an idiographic approach.","PeriodicalId":49807,"journal":{"name":"Mis Quarterly","volume":"34 1","pages":""},"PeriodicalIF":7.3,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140015671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach 利用黑客漏洞标签创建前瞻性网络威胁情报:深度迁移学习方法
IF 7.3 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-01 DOI: 10.25300/misq/2023/17316
Benjamin M. Ampel, Sagar Samtani, Hongyi Zhu, Hsinchun Chen
The rapid proliferation of complex information systems has been met by an ever-increasing quantity of exploits that can cause irreparable cyber breaches. To mitigate these cyber threats, academia and industry have placed a significant focus on proactively identifying and labeling exploits developed by the international hacker community. However, prevailing approaches for labeling exploits in hacker forums do not leverage metadata from exploit darknet markets or public exploit repositories to enhance labeling performance. In this study, we adopted the computational design science paradigm to develop a novel information technology artifact, the deep transfer learning exploit labeler (DTL-EL). DTL-EL incorporates a pre-initialization design, multi-layer deep transfer learning (DTL), and a self-attention mechanism to automatically label exploits in hacker forums. We rigorously evaluated the proposed DTL-EL against state-of-the-art non-DTL benchmark methods based in classical machine learning and deep learning. Results suggest that the proposed DTL-EL significantly outperforms benchmark methods based on accuracy, precision, recall, and F1-score. Our proposed DTL-EL framework provides important practical implications for key stakeholders such as cybersecurity managers, analysts, and educators.
#html-body[data-pb-style=YM00THS]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left-top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll}随着复杂信息系统的迅速发展,可造成不可挽回的网络漏洞的漏洞数量也在不断增加。为了减轻这些网络威胁,学术界和工业界都非常重视主动识别和标记国际黑客社区开发的漏洞。然而,对黑客论坛中的漏洞进行标注的主流方法并没有利用漏洞暗网市场或公共漏洞库中的元数据来提高标注性能。在本研究中,我们采用计算设计科学范式开发了一种新型信息技术工具--深度转移学习漏洞利用标签器(DTL-EL)。DTL-EL 融合了预初始化设计、多层深度迁移学习(DTL)和自我关注机制,可自动标记黑客论坛中的漏洞。我们对照基于经典机器学习和深度学习的最先进的非DTL基准方法,对所提出的DTL-EL进行了严格评估。结果表明,基于准确度、精确度、召回率和 F1 分数,拟议的 DTL-EL 明显优于基准方法。我们提出的 DTL-EL 框架为网络安全管理人员、分析师和教育工作者等关键利益相关者提供了重要的实际意义。
{"title":"Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach","authors":"Benjamin M. Ampel, Sagar Samtani, Hongyi Zhu, Hsinchun Chen","doi":"10.25300/misq/2023/17316","DOIUrl":"https://doi.org/10.25300/misq/2023/17316","url":null,"abstract":"<style>#html-body [data-pb-style=YM00THS]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll}</style>The rapid proliferation of complex information systems has been met by an ever-increasing quantity of exploits that can cause irreparable cyber breaches. To mitigate these cyber threats, academia and industry have placed a significant focus on proactively identifying and labeling exploits developed by the international hacker community. However, prevailing approaches for labeling exploits in hacker forums do not leverage metadata from exploit darknet markets or public exploit repositories to enhance labeling performance. In this study, we adopted the computational design science paradigm to develop a novel information technology artifact, the deep transfer learning exploit labeler (DTL-EL). DTL-EL incorporates a pre-initialization design, multi-layer deep transfer learning (DTL), and a self-attention mechanism to automatically label exploits in hacker forums. We rigorously evaluated the proposed DTL-EL against state-of-the-art non-DTL benchmark methods based in classical machine learning and deep learning. Results suggest that the proposed DTL-EL significantly outperforms benchmark methods based on accuracy, precision, recall, and F1-score. Our proposed DTL-EL framework provides important practical implications for key stakeholders such as cybersecurity managers, analysts, and educators.","PeriodicalId":49807,"journal":{"name":"Mis Quarterly","volume":"66 4 1","pages":""},"PeriodicalIF":7.3,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140015658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prejudiced against the Machine? Implicit Associations and the Transience of Algorithm Aversion 对机器有偏见?隐式关联与算法厌恶的短暂性
IF 7.3 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-01 DOI: 10.25300/misq/2022/17961
Ofir Turel and Shivam Kalhan
Algorithm aversion is an important and persistent issue that prevents harvesting the benefits of advancements in artificial intelligence. The literature thus far has provided explanations that primarily focus on conscious reflective processes. Here, we supplement this view by taking an unconscious perspective that can be highly informative. Building on theories of implicit prejudice, in a preregistered study, we suggest that people develop an implicit bias (i.e., prejudice) against artificial intelligence (AI) systems, as a different and threatening “species,” the behavior of which is unknown. Like in other contexts of prejudice, we expected people to be guided by this implicit bias but try to override it. This leads to some willingness to rely on algorithmic advice (appreciation), which is reduced as a function of people’s implicit prejudice against the machine. Next, building on the somatic marker hypothesis and the accessibility-diagnosticity perspective, we provide an explanation as to why aversion is ephemeral. As people learn about the performance of an algorithm, they depend less on primal implicit biases when deciding whether to rely on the AI’s advice. Two studies (n1 = 675, n2 = 317) that use the implicit association test consistently support this view. Two additional studies (n3 = 255, n4 = 332) rule out alternative explanations and provide stronger support for our assertions. The findings ultimately suggest that moving the needle between aversion and appreciation depends initially on one’s general unconscious bias against AI because there is insufficient information to override it. They further suggest that in later use stages, this shift depends on accessibility to diagnostic information about the AI’s performance, which reduces the weight given to unconscious prejudice.
#html-body [data- pp -style=TE8QKQW]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat: none -repeat;迄今为止,文献提供的解释主要集中在有意识的反思过程上。在这里,我们通过采用一种可以提供大量信息的无意识视角来补充这种观点。基于内隐偏见理论,在一项预先登记的研究中,我们建议人们对人工智能(AI)系统产生内隐偏见(即偏见),将其作为一种不同的威胁“物种”,其行为是未知的。就像在其他偏见的情况下一样,我们期望人们被这种隐性偏见所引导,但却试图克服它。这导致人们愿意依赖算法的建议(欣赏),而这是人们对机器的隐性偏见的结果。接下来,基于体细胞标记假说和可及性诊断的观点,我们提供了一个关于为什么厌恶是短暂的解释。随着人们了解算法的性能,在决定是否依赖人工智能的建议时,他们对原始内隐偏见的依赖就会减少。使用内隐关联检验的两项研究(n1 = 675, n2 = 317)一致支持这一观点。另外两项研究(n3 = 255, n4 = 332)排除了其他解释,为我们的断言提供了更有力的支持。研究结果最终表明,在厌恶和欣赏之间移动指针最初取决于一个人对人工智能的普遍无意识偏见,因为没有足够的信息来克服它。他们进一步表示,在后期使用阶段,这种转变取决于对人工智能表现的诊断信息的可访问性,这减少了无意识偏见的权重。
{"title":"Prejudiced against the Machine? Implicit Associations and the Transience of Algorithm Aversion","authors":"Ofir Turel and Shivam Kalhan","doi":"10.25300/misq/2022/17961","DOIUrl":"https://doi.org/10.25300/misq/2022/17961","url":null,"abstract":"<style>#html-body [data-pb-style=TE8QKQW]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll}</style>Algorithm aversion is an important and persistent issue that prevents harvesting the benefits of advancements in artificial intelligence. The literature thus far has provided explanations that primarily focus on conscious reflective processes. Here, we supplement this view by taking an unconscious perspective that can be highly informative. Building on theories of implicit prejudice, in a preregistered study, we suggest that people develop an implicit bias (i.e., prejudice) against artificial intelligence (AI) systems, as a different and threatening “species,” the behavior of which is unknown. Like in other contexts of prejudice, we expected people to be guided by this implicit bias but try to override it. This leads to some willingness to rely on algorithmic advice (appreciation), which is reduced as a function of people’s implicit prejudice against the machine. Next, building on the somatic marker hypothesis and the accessibility-diagnosticity perspective, we provide an explanation as to why aversion is ephemeral. As people learn about the performance of an algorithm, they depend less on primal implicit biases when deciding whether to rely on the AI’s advice. Two studies (n1 = 675, n2 = 317) that use the implicit association test consistently support this view. Two additional studies (n3 = 255, n4 = 332) rule out alternative explanations and provide stronger support for our assertions. The findings ultimately suggest that moving the needle between aversion and appreciation depends initially on one’s general unconscious bias against AI because there is insufficient information to override it. They further suggest that in later use stages, this shift depends on accessibility to diagnostic information about the AI’s performance, which reduces the weight given to unconscious prejudice.","PeriodicalId":49807,"journal":{"name":"Mis Quarterly","volume":"116 6","pages":""},"PeriodicalIF":7.3,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138455780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What Disrupts Flow in Office Work? The Impact of Frequency and Relevance of IT-Mediated Interruptions 什么会扰乱办公室工作中的心流状态?信息技术介导的中断的频率和相关性的影响
IF 7.3 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-01 DOI: 10.25300/misq/2023/17200
Mario Nadj, Raphael Rissler, Marc T. P. Adam, Michael T. Knierim, Maximilian X. Li, Alexander Maedche, René Riedl
Flow, the holistic sensation people experience when they act with total involvement, is a known driver for desired work outcomes like task performance. However, the increasing ubiquity of IT at work can disrupt employees’ flow. Thus, the impact of IT-mediated interruptions on flow warrants more attention in research and practice. We conducted a NeuroIS laboratory experiment focusing on a typical office work task—an invoice matching task (i.e., matching customer payments to invoices). We manipulated interruption frequency (low, high) and content relevance (irrelevant, relevant) to study the impact of interruptions on self-reported flow, its dimensions, and high-frequency heart rate variability (HF-HRV; calculated from electrocardiography recordings) as a proxy for parasympathetic nervous system (PNS) activation. We found that content relevance moderated the relationship between interruption frequency and self-reported flow and that these results vary along flow dimensions. Content relevance also moderated the relationship between interruption frequency and PNS activation. Furthermore, self-reported flow was positively associated with both perceived and objective task performance, while PNS activation was not related to either performance measure. Lastly, we found no relationship between PNS activation (measured by HF-HRV) and self-reported flow, contributing to an important debate in the NeuroIS literature on whether physiological evidence constitutes an alternative or a complement to self-reports. Overall, our findings indicate that frequent interruptions are not harmful per se. Rather, considering content relevance is critical for a more comprehensive understanding of the effects on self-reported flow, its dimensions, and the underlying physiology.
“心流”是人们在完全投入的情况下所体验到的整体感觉,是预期工作成果(如任务绩效)的一个众所周知的驱动因素。然而,工作中越来越普遍的IT可能会扰乱员工的流动。因此,在研究和实践中,it介导的中断对心流的影响值得更多的关注。我们进行了一个NeuroIS实验室实验,重点关注一个典型的办公室工作任务——发票匹配任务(即,将客户付款与发票匹配)。我们操纵中断频率(低、高)和内容相关性(不相关、相关)来研究中断对自我报告的血流、其维度和高频心率变异性(HF-HRV;根据心电图记录计算)作为副交感神经系统(PNS)激活的代理。我们发现,内容相关性调节了中断频率和自我报告心流之间的关系,并且这些结果随心流维度而变化。内容相关性也调节了中断频率和PNS激活之间的关系。此外,自我报告的心流与感知和客观任务绩效呈正相关,而PNS激活与任何绩效指标都无关。最后,我们发现PNS激活(通过HF-HRV测量)和自我报告的血流之间没有关系,这引起了神经学文献中关于生理证据是否构成自我报告的替代或补充的重要争论。总的来说,我们的研究结果表明,频繁的干扰本身并没有害处。相反,考虑内容相关性对于更全面地理解对自我报告心流的影响、其维度和潜在生理学至关重要。
{"title":"What Disrupts Flow in Office Work? The Impact of Frequency and Relevance of IT-Mediated Interruptions","authors":"Mario Nadj, Raphael Rissler, Marc T. P. Adam, Michael T. Knierim, Maximilian X. Li, Alexander Maedche, René Riedl","doi":"10.25300/misq/2023/17200","DOIUrl":"https://doi.org/10.25300/misq/2023/17200","url":null,"abstract":"<style>#html-body [data-pb-style=PPEGXSK]{justify-content:flex-start;display:flex;flex-direction:column;background-position:left top;background-size:cover;background-repeat:no-repeat;background-attachment:scroll}</style>Flow, the holistic sensation people experience when they act with total involvement, is a known driver for desired work outcomes like task performance. However, the increasing ubiquity of IT at work can disrupt employees’ flow. Thus, the impact of IT-mediated interruptions on flow warrants more attention in research and practice. We conducted a NeuroIS laboratory experiment focusing on a typical office work task—an invoice matching task (i.e., matching customer payments to invoices). We manipulated interruption frequency (low, high) and content relevance (irrelevant, relevant) to study the impact of interruptions on self-reported flow, its dimensions, and high-frequency heart rate variability (HF-HRV; calculated from electrocardiography recordings) as a proxy for parasympathetic nervous system (PNS) activation. We found that content relevance moderated the relationship between interruption frequency and self-reported flow and that these results vary along flow dimensions. Content relevance also moderated the relationship between interruption frequency and PNS activation. Furthermore, self-reported flow was positively associated with both perceived and objective task performance, while PNS activation was not related to either performance measure. Lastly, we found no relationship between PNS activation (measured by HF-HRV) and self-reported flow, contributing to an important debate in the NeuroIS literature on whether physiological evidence constitutes an alternative or a complement to self-reports. Overall, our findings indicate that frequent interruptions are not harmful per se. Rather, considering content relevance is critical for a more comprehensive understanding of the effects on self-reported flow, its dimensions, and the underlying physiology.","PeriodicalId":49807,"journal":{"name":"Mis Quarterly","volume":" 732","pages":""},"PeriodicalIF":7.3,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138475761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Mis Quarterly
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1