This study moves beyond the conventional focus on technology access, adoption, and participation in communities, and instead presents a perspective on digital inclusion as a complex process of both empowerment and subjugation. Drawing on Foucault’s theorization on subjectivity and power, our case study of community health workers in rural India reveals that the adoption of an mHealth application simultaneously subordinated and strengthened the subjectivity of the community health workers. The study explicates the process through which the health workers oscillated between the enhancement of their individual efficacy, and their submission to institutionalized power as facilitated by the mHealth application during their everyday work practices. Thus, by shifting the focus from “who” is digitally included to “how” they become digitally included, our research provides a fresh perspective that enriches and deepens the discourse of digital inclusion. It generates both theoretical and practical implications for anyone interested in understanding digital inclusion from a more granulated and practice-based perspective.
{"title":"Technologies of Power in Digital Inclusion","authors":"Priyanka Pandey, Yingqin Zheng","doi":"10.17705/1jais.00822","DOIUrl":"https://doi.org/10.17705/1jais.00822","url":null,"abstract":"This study moves beyond the conventional focus on technology access, adoption, and participation in communities, and instead presents a perspective on digital inclusion as a complex process of both empowerment and subjugation. Drawing on Foucault’s theorization on subjectivity and power, our case study of community health workers in rural India reveals that the adoption of an mHealth application simultaneously subordinated and strengthened the subjectivity of the community health workers. The study explicates the process through which the health workers oscillated between the enhancement of their individual efficacy, and their submission to institutionalized power as facilitated by the mHealth application during their everyday work practices. Thus, by shifting the focus from “who” is digitally included to “how” they become digitally included, our research provides a fresh perspective that enriches and deepens the discourse of digital inclusion. It generates both theoretical and practical implications for anyone interested in understanding digital inclusion from a more granulated and practice-based perspective.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"1 1","pages":"4"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88448612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anuschka Schmitt, Naim Zierau, Andreas Janson, J. Leimeister
The pervasiveness and increasing sophistication of artificial intelligence (AI)-based artifacts within private, organizational, and social realms are changing how humans interact with machines. Theorizing about the way that humans perceive AI-based artifacts is, for example, crucial to understanding why and to what extent humans deem these artifacts to be competent for decision-making but has traditionally taken a modality-agnostic view. In this paper, we theorize about a particular case of interaction, namely that of voice-based interaction with AI-based artifacts. We argue that the capabilities and perceived naturalness of such artifacts, fueled by continuous advances in natural language processing, induce users to deem an artifact as able to act autonomously in a goal-oriented manner. We show that there is a positive direct relationship between the voice capabilities of an artifact and users’ agency attribution, ultimately obscuring the artifact’s true nature and competencies. This relationship is further moderated by the artifact’s actual agency, uncertainty, and user characteristics.
{"title":"The Role of AI-Based Artifacts' Voice Capabilities for Agency Attribution","authors":"Anuschka Schmitt, Naim Zierau, Andreas Janson, J. Leimeister","doi":"10.17705/1jais.00827","DOIUrl":"https://doi.org/10.17705/1jais.00827","url":null,"abstract":"The pervasiveness and increasing sophistication of artificial intelligence (AI)-based artifacts within private, organizational, and social realms are changing how humans interact with machines. Theorizing about the way that humans perceive AI-based artifacts is, for example, crucial to understanding why and to what extent humans deem these artifacts to be competent for decision-making but has traditionally taken a modality-agnostic view. In this paper, we theorize about a particular case of interaction, namely that of voice-based interaction with AI-based artifacts. We argue that the capabilities and perceived naturalness of such artifacts, fueled by continuous advances in natural language processing, induce users to deem an artifact as able to act autonomously in a goal-oriented manner. We show that there is a positive direct relationship between the voice capabilities of an artifact and users’ agency attribution, ultimately obscuring the artifact’s true nature and competencies. This relationship is further moderated by the artifact’s actual agency, uncertainty, and user characteristics.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"1 1","pages":"7"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91087811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rapid developments in real-time collaborative technologies, coupled with the quest for innovation and creativity, have made global virtual teams (GVTs) a viable workplace collaboration option that many companies are turning to. Although diverse team member perspectives in GVTs are expected to foster creativity, cultural diversity within GVTs also poses significant challenges related to knowledge exchange and integration among team members. Grounding our work in the team adaptation and cultural intelligence (CQ) literatures, we suggest CQ as a plausible modality for cultural adaptation in GVTs. Specifically, we propose a nomological network comprising CQ dimensions (motivation, cognition, metacognition, and behavior) serving as a cultural adaptation mechanism for fostering creativity in GVT outcomes. We contextualize and extend CQ theory, which has previously focused on face-to-face contexts, to the virtual collaborative GVT environment. For this, we conceptualize the significant role of deep-level implicitly negotiated adaptative behavior (role structure adaptation) in GVTs—in addition to surface-level explicitly displayed adaptative behavior (CQ behavior). We tested the proposed model through a sequential mixed methods approach that integrated the results from a quantitative two-wave survey study with findings from a qualitative study comprising expert interviews, to arrive at rich and robust inferences and metainferences. The proposed CQ-for-GVT framework, along with delineated boundary conditions and associated propositions, explicates an integrative model explaining the role of CQ for GVT creativity performance. The delineated model not only has theoretical implications but also provides useful directions for GVT practitioners.
{"title":"Contextualizing Team Adaptation for Fostering Creative Outcomes in Multicultural Virtual Teams: A Mixed Methods Approach","authors":"Anuragini Shirish, S. Srivastava, I. Boughzala","doi":"10.17705/1jais.00811","DOIUrl":"https://doi.org/10.17705/1jais.00811","url":null,"abstract":"Rapid developments in real-time collaborative technologies, coupled with the quest for innovation and creativity, have made global virtual teams (GVTs) a viable workplace collaboration option that many companies are turning to. Although diverse team member perspectives in GVTs are expected to foster creativity, cultural diversity within GVTs also poses significant challenges related to knowledge exchange and integration among team members. Grounding our work in the team adaptation and cultural intelligence (CQ) literatures, we suggest CQ as a plausible modality for cultural adaptation in GVTs. Specifically, we propose a nomological network comprising CQ dimensions (motivation, cognition, metacognition, and behavior) serving as a cultural adaptation mechanism for fostering creativity in GVT outcomes. We contextualize and extend CQ theory, which has previously focused on face-to-face contexts, to the virtual collaborative GVT environment. For this, we conceptualize the significant role of deep-level implicitly negotiated adaptative behavior (role structure adaptation) in GVTs—in addition to surface-level explicitly displayed adaptative behavior (CQ behavior). We tested the proposed model through a sequential mixed methods approach that integrated the results from a quantitative two-wave survey study with findings from a qualitative study comprising expert interviews, to arrive at rich and robust inferences and metainferences. The proposed CQ-for-GVT framework, along with delineated boundary conditions and associated propositions, explicates an integrative model explaining the role of CQ for GVT creativity performance. The delineated model not only has theoretical implications but also provides useful directions for GVT practitioners.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"14 1","pages":"7"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82042677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jaime B. Windeler, Cathy Urquhart, Jason Bennett Thatcher, Michelle Carter, Arlene Bailey
{"title":"Special Issue Introduction: JAIS Special Issue on Technology and Social Inclusion","authors":"Jaime B. Windeler, Cathy Urquhart, Jason Bennett Thatcher, Michelle Carter, Arlene Bailey","doi":"10.17705/1jais.00841","DOIUrl":"https://doi.org/10.17705/1jais.00841","url":null,"abstract":"<jats:p />","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135311032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raghava Mukkamala, Robert J. Kauffman, Helle Zinner Henriksen
The UN High Commissioner on Refugees (UNHCR) is pursuing a social media strategy to inform people about displaced populations and refugee emergencies. It is actively engaging public figures to increase awareness through its prosocial communications and improve social informedness and support for policy changes in its services. We studied the Twitter communications of UNHCR social media champions and investigated their role as high-profile influencers. In this study, we offer a design science research and data analytics framework and propositions based on the social informedness theory we propose in this paper to assess communication about UNHCR’s mission. Two variables—refugee-emergency and champion type—relate to the informedness of UNHCR champions’ followers. Based on a Twitter sentiment and attitude corpus, we applied a five-step design science analytics framework involving machine learning and natural language processing to test how the emergency type and champion type impact social communication patterns. Positive and neutral sentiment dominated the tweets of the champions and their followers for most refugee-emergency types. High participation-intensity champions emphasized high-intensity emergencies with tweet patterns reflecting dominant positive or neutral sentiment and sharing/liking attitudes. However, we found that sports figures effects were limited in spreading UNHCR’s message, despite their millions of followers. We demonstrate the power of data science for prosocial policy based on refugee crisis awareness and instantiate our methods and knowledge contributions in a research framework that derives knowledge, decisions, and actions from behavioral, design, and economics of information systems perspectives.
{"title":"Champions for Social Good: How Can We Discover Social Sentiment and Attitude-Driven Patterns in Prosocial Communication?","authors":"Raghava Mukkamala, Robert J. Kauffman, Helle Zinner Henriksen","doi":"10.17705/1jais.00810","DOIUrl":"https://doi.org/10.17705/1jais.00810","url":null,"abstract":"The UN High Commissioner on Refugees (UNHCR) is pursuing a social media strategy to inform people about displaced populations and refugee emergencies. It is actively engaging public figures to increase awareness through its prosocial communications and improve social informedness and support for policy changes in its services. We studied the Twitter communications of UNHCR social media champions and investigated their role as high-profile influencers. In this study, we offer a design science research and data analytics framework and propositions based on the social informedness theory we propose in this paper to assess communication about UNHCR’s mission. Two variables—refugee-emergency and champion type—relate to the informedness of UNHCR champions’ followers. Based on a Twitter sentiment and attitude corpus, we applied a five-step design science analytics framework involving machine learning and natural language processing to test how the emergency type and champion type impact social communication patterns. Positive and neutral sentiment dominated the tweets of the champions and their followers for most refugee-emergency types. High participation-intensity champions emphasized high-intensity emergencies with tweet patterns reflecting dominant positive or neutral sentiment and sharing/liking attitudes. However, we found that sports figures effects were limited in spreading UNHCR’s message, despite their millions of followers. We demonstrate the power of data science for prosocial policy based on refugee crisis awareness and instantiate our methods and knowledge contributions in a research framework that derives knowledge, decisions, and actions from behavioral, design, and economics of information systems perspectives.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135448383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Advances in reinforcement learning and implicit data collection on large-scale commercial platforms mark the beginning of a new era of personalization aimed at the adaptive control of human user environments. We present five emergent features of this new paradigm of personalization that endanger persons and societies at scale and analyze their potential to reduce personal autonomy, destabilize social and political systems, and facilitate mass surveillance and social control, among other concerns. We argue that current data protection laws, most notably the European Union’s General Data Protection Regulation, are limited in their ability to adequately address many of these issues. Nevertheless, we believe that IS researchers are well-situated to engage with and investigate this new era of personalization. We propose three distinct directions for ethically aware reinforcement learning-based personalization research uniquely suited to the strengths of IS researchers across the sociotechnical spectrum.
{"title":"Taking the Person Seriously: Ethically Aware IS Research in the Era of Reinforcement Learning-Based Personalization","authors":"Travis Greene, Galit Shmueli, Soumya Ray","doi":"10.17705/1jais.00800","DOIUrl":"https://doi.org/10.17705/1jais.00800","url":null,"abstract":"Advances in reinforcement learning and implicit data collection on large-scale commercial platforms mark the beginning of a new era of personalization aimed at the adaptive control of human user environments. We present five emergent features of this new paradigm of personalization that endanger persons and societies at scale and analyze their potential to reduce personal autonomy, destabilize social and political systems, and facilitate mass surveillance and social control, among other concerns. We argue that current data protection laws, most notably the European Union’s General Data Protection Regulation, are limited in their ability to adequately address many of these issues. Nevertheless, we believe that IS researchers are well-situated to engage with and investigate this new era of personalization. We propose three distinct directions for ethically aware reinforcement learning-based personalization research uniquely suited to the strengths of IS researchers across the sociotechnical spectrum.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135448631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
False claims and misinformation on social media have substantially increased in the last few years. Some people have incorrectly interpreted such content as the truth, sometimes to the extent that it transforms their view of reality and subsequently leads to actions that cause harm and suffering. Despite the burgeoning body of research on misinformation on social media, we know little about the process by which social media-driven misinformation shapes and reinforces false beliefs that result in detrimental outcomes. Building on insights from dramaturgical tragedy, theories of truth, and research on social media, we develop a process theory that explains how social media-driven misinformation transforms a person’s view of reality in a way that leads to detrimental human action.
{"title":"Tragedy, Truth, and Technology: The 3T Theory of Social Media-Driven Misinformation","authors":"Nicholas Roberts, Hamed Qahri-Saremi","doi":"10.17705/1jais.00831","DOIUrl":"https://doi.org/10.17705/1jais.00831","url":null,"abstract":"False claims and misinformation on social media have substantially increased in the last few years. Some people have incorrectly interpreted such content as the truth, sometimes to the extent that it transforms their view of reality and subsequently leads to actions that cause harm and suffering. Despite the burgeoning body of research on misinformation on social media, we know little about the process by which social media-driven misinformation shapes and reinforces false beliefs that result in detrimental outcomes. Building on insights from dramaturgical tragedy, theories of truth, and research on social media, we develop a process theory that explains how social media-driven misinformation transforms a person’s view of reality in a way that leads to detrimental human action.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"25 1","pages":"3"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88390488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dawei (David) Wang, Alexandra Durcikova, A. Dennis
Information security is a multilevel phenomenon with employee security decisions being influenced by macrolevel factors (e.g., organizational policies), mesolevel factors (e.g., one’s immediate workgroup—IW), and microlevel factors (e.g., individual personalities). We argue that an employee’s local IW (i.e., immediate supervisor and coworkers) has a strong effect on security. This paper focuses on the effects of these mesolevel factors in the presence of macro- and microlevel factors. Drawing on the social structure and social learning framework as well as workgroup research, we hypothesize that the security behavior of an employee’s IW supervisor and coworkers moderated by the nature of these relationships influences information security decisions. Our research, based on a sample of 217 full-time employees, reveals that the IW significantly affects security decisions, over and above the micro- and macrolevel factors. These effects are moderated by the nature of the relationship between employees and their IW supervisor (leader-member exchange) and coworkers (team-member exchange). A post hoc analysis shows that the mesolevel factors alone had the same explanatory power as the micro- and macrolevels combined. Our research suggests that future theory and research should include the IW and that organizations should share security responsibilities with line managers and help them understand their substantial impact on information security. Security training programs should ask employees about the behaviors of their IW supervisor and coworkers and, where needed, deliver anti-neutralization training to mitigate the effects of the IW’s noncompliance behaviors.
{"title":"Security is Local: The Influence of the Immediate Workgroup on Information Security","authors":"Dawei (David) Wang, Alexandra Durcikova, A. Dennis","doi":"10.17705/1jais.00812","DOIUrl":"https://doi.org/10.17705/1jais.00812","url":null,"abstract":"Information security is a multilevel phenomenon with employee security decisions being influenced by macrolevel factors (e.g., organizational policies), mesolevel factors (e.g., one’s immediate workgroup—IW), and microlevel factors (e.g., individual personalities). We argue that an employee’s local IW (i.e., immediate supervisor and coworkers) has a strong effect on security. This paper focuses on the effects of these mesolevel factors in the presence of macro- and microlevel factors. Drawing on the social structure and social learning framework as well as workgroup research, we hypothesize that the security behavior of an employee’s IW supervisor and coworkers moderated by the nature of these relationships influences information security decisions. Our research, based on a sample of 217 full-time employees, reveals that the IW significantly affects security decisions, over and above the micro- and macrolevel factors. These effects are moderated by the nature of the relationship between employees and their IW supervisor (leader-member exchange) and coworkers (team-member exchange). A post hoc analysis shows that the mesolevel factors alone had the same explanatory power as the micro- and macrolevels combined. Our research suggests that future theory and research should include the IW and that organizations should share security responsibilities with line managers and help them understand their substantial impact on information security. Security training programs should ask employees about the behaviors of their IW supervisor and coworkers and, where needed, deliver anti-neutralization training to mitigate the effects of the IW’s noncompliance behaviors.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"60 1","pages":"4"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84930965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tapani Rinta-Kahila, Esko Penttinen, Antti Salovaara, Wael Soliman, Joona Ruissalo
Cognitive automation powered by advanced intelligent technologies is increasingly enabling organizations to automate more of their knowledge work tasks. Although this often offers higher efficiency and lower costs, cognitive automation exacerbates the erosion of human skill and expertise in automated tasks. Accepting the erosion of obsolete skills is necessary to reap the benefits of technology—however, the erosion of essential human expertise is problematic if workers remain accountable for tasks for which they lack sufficient understanding, rendering them incapable of responding if the automation fails. Though the phenomenon is widely acknowledged, the dynamics behind such undesired skill erosion are poorly understood. Thus, taking the perspective of sociotechnical systems, we conducted a case study of an accounting firm that had experienced skill erosion over a number of years due to reliance on their software’s automated functions. We synthesized our findings using causal loop modeling based on system dynamics. The resulting dynamic model explains skill erosion via an interplay between humans’ automation reliance, complacency, and mindful conduction. It shows how increasing reliance on automation fosters complacency at both individual and organizational levels, weakening workers’ mindfulness across three work task facets (activity awareness, competence maintenance, and output assessment), resulting in skill erosion. Such skill erosion may remain obscure, acknowledged by neither workers nor managers. We conclude by discussing the implications for theory and practice and identifying directions for future research.
{"title":"The Vicious Circles of Skill Erosion: A Case Study of Cognitive Automation","authors":"Tapani Rinta-Kahila, Esko Penttinen, Antti Salovaara, Wael Soliman, Joona Ruissalo","doi":"10.17705/1jais.00829","DOIUrl":"https://doi.org/10.17705/1jais.00829","url":null,"abstract":"Cognitive automation powered by advanced intelligent technologies is increasingly enabling organizations to automate more of their knowledge work tasks. Although this often offers higher efficiency and lower costs, cognitive automation exacerbates the erosion of human skill and expertise in automated tasks. Accepting the erosion of obsolete skills is necessary to reap the benefits of technology—however, the erosion of essential human expertise is problematic if workers remain accountable for tasks for which they lack sufficient understanding, rendering them incapable of responding if the automation fails. Though the phenomenon is widely acknowledged, the dynamics behind such undesired skill erosion are poorly understood. Thus, taking the perspective of sociotechnical systems, we conducted a case study of an accounting firm that had experienced skill erosion over a number of years due to reliance on their software’s automated functions. We synthesized our findings using causal loop modeling based on system dynamics. The resulting dynamic model explains skill erosion via an interplay between humans’ automation reliance, complacency, and mindful conduction. It shows how increasing reliance on automation fosters complacency at both individual and organizational levels, weakening workers’ mindfulness across three work task facets (activity awareness, competence maintenance, and output assessment), resulting in skill erosion. Such skill erosion may remain obscure, acknowledged by neither workers nor managers. We conclude by discussing the implications for theory and practice and identifying directions for future research.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"143 1","pages":"2"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80262130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper examines the underlying mechanisms through which paternalistic leadership (PL) motivates employees’ information systems policy (ISP) compliance. We propose that the three dimensions of PL—authoritarian leadership (AL), benevolent leadership (BL), and moral leadership (ML)—influence employees’ ISP compliance by affecting their perceptions of two information security control mechanisms: sanctions and the information security climate. Based on survey data from 760 participants, we found that the impact of AL is partially mediated by employees’ perceptions of sanctions, the impact of BL is partially mediated by employees’ perceptions of the information security climate, and the impact of ML is partially mediated by employees’ perceptions of both sanctions and the information security climate. Our research extends the existing literature by exploring the impact of specific leadership styles on employees’ perceptions of information security control mechanisms and by proposing that perceptions of information security control mechanisms play a mediating role between PL and ISP compliance. The findings suggest that in addition to choosing effective control mechanisms, it is also important for leaders to adjust their leadership style to ensure that employees perceive control mechanisms in the expected manner.
{"title":"How Do Paternalistic Leaders Motivate Employees' Information Security Compliance? Building a Climate and Applying Sanctions","authors":"Jiawen Zhu, G. Feng, Huigang Liang, K. Tsui","doi":"10.17705/1jais.00794","DOIUrl":"https://doi.org/10.17705/1jais.00794","url":null,"abstract":"This paper examines the underlying mechanisms through which paternalistic leadership (PL) motivates employees’ information systems policy (ISP) compliance. We propose that the three dimensions of PL—authoritarian leadership (AL), benevolent leadership (BL), and moral leadership (ML)—influence employees’ ISP compliance by affecting their perceptions of two information security control mechanisms: sanctions and the information security climate. Based on survey data from 760 participants, we found that the impact of AL is partially mediated by employees’ perceptions of sanctions, the impact of BL is partially mediated by employees’ perceptions of the information security climate, and the impact of ML is partially mediated by employees’ perceptions of both sanctions and the information security climate. Our research extends the existing literature by exploring the impact of specific leadership styles on employees’ perceptions of information security control mechanisms and by proposing that perceptions of information security control mechanisms play a mediating role between PL and ISP compliance. The findings suggest that in addition to choosing effective control mechanisms, it is also important for leaders to adjust their leadership style to ensure that employees perceive control mechanisms in the expected manner.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"33 1","pages":"5"},"PeriodicalIF":5.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88534447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}