Algorithmic decision-making systems (ADMS) are increasingly being used by public and private organizations to enact decisions traditionally made by human beings across a broad range of domains, including business, law enforcement, education, and healthcare. Their growing prevalence engenders profound ethical challenges, which, we maintain, should be examined in a structured and theoretically informed fashion. However, much of the ethical exploration of ADMS within the IS field draws upon an atheoretical application of ethics. In this paper, we argue that the “big three” ethical theories of consequentialism, deontology, and virtue ethics can inform a structured comparative analysis of the ethical significance of ADMS. We demonstrate the value of such an approach through an illustrative case study of an ADMS in use by an Australian bank. Building upon this analysis, we address four characteristics of ADMS from the three theoretical perspectives, provide guidance on the contexts within which the application of each theory might be particularly fruitful, and highlight the advantages of theoretically grounded ethical analyses of ADMS.
{"title":"Research Perspectives: Toward Theoretical Rigor in Ethical Analysis: The Case of Algorithmic Decision-Making Systems","authors":"Uri Gal, Sean W. Hansen, Allen S. Lee","doi":"10.17705/1jais.00784","DOIUrl":"https://doi.org/10.17705/1jais.00784","url":null,"abstract":"Algorithmic decision-making systems (ADMS) are increasingly being used by public and private organizations to enact decisions traditionally made by human beings across a broad range of domains, including business, law enforcement, education, and healthcare. Their growing prevalence engenders profound ethical challenges, which, we maintain, should be examined in a structured and theoretically informed fashion. However, much of the ethical exploration of ADMS within the IS field draws upon an atheoretical application of ethics. In this paper, we argue that the “big three” ethical theories of consequentialism, deontology, and virtue ethics can inform a structured comparative analysis of the ethical significance of ADMS. We demonstrate the value of such an approach through an illustrative case study of an ADMS in use by an Australian bank. Building upon this analysis, we address four characteristics of ADMS from the three theoretical perspectives, provide guidance on the contexts within which the application of each theory might be particularly fruitful, and highlight the advantages of theoretically grounded ethical analyses of ADMS.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"41 1","pages":"1"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75843068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this study, we investigate whether and to what extent community managers in online collaborative communities can stimulate community activities through their engagement. Using a novel data set of 22 large online idea crowdsourcing campaigns, we find that moderate but steady manager activities are adequate to enhance community participation. Moreover, we show that appreciation, motivation, and intellectual stimulation by community managers are positively associated with community participation but that the effectiveness of these communication strategies depends on the form of participation managers wish to encourage. Finally, the data reveal that community manager activities requiring more effort, such as media file uploads vs. simple written comments, have a stronger effect on community participation.
{"title":"The Effect of Community Managers on Online Idea Crowdsourcing Activities","authors":"Lars Hornuf, Sabrina Jeworrek","doi":"10.17705/1jais.00777","DOIUrl":"https://doi.org/10.17705/1jais.00777","url":null,"abstract":"In this study, we investigate whether and to what extent community managers in online collaborative communities can stimulate community activities through their engagement. Using a novel data set of 22 large online idea crowdsourcing campaigns, we find that moderate but steady manager activities are adequate to enhance community participation. Moreover, we show that appreciation, motivation, and intellectual stimulation by community managers are positively associated with community participation but that the effectiveness of these communication strategies depends on the form of participation managers wish to encourage. Finally, the data reveal that community manager activities requiring more effort, such as media file uploads vs. simple written comments, have a stronger effect on community participation.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"33 1","pages":"3"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77201323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The design of sensitive online healthcare systems must balance the requirements of privacy and accountability for the good of individuals, organizations, and society. Via a design science research approach, we build and evaluate a sophisticated software system for the online provision of psychosocial healthcare to distributed and vulnerable populations. Multidisciplinary research capabilities are embedded within the system to investigate the effectiveness of online treatment protocols. Throughout the development cycles of the system, we build an emergent design theory of scrutiny that applies a multi-layer protocol to support governance of privacy and accountability in sensitive online applications. The design goal is to balance stakeholder privacy protections with the need to provide for accountable interventions in critical and well-defined care situations. The research implications for the development and governance of online applications in numerous privacy-sensitive application areas are explored
{"title":"The Design of a System for Online Psychosocial Care: Balancing Privacy and Accountability in Sensitive Online Healthcare Environments","authors":"Jonas Sjöström, Pär J. Ågerfalk, A. Hevner","doi":"10.17705/1JAIS.00717","DOIUrl":"https://doi.org/10.17705/1JAIS.00717","url":null,"abstract":"The design of sensitive online healthcare systems must balance the requirements of privacy and accountability for the good of individuals, organizations, and society. Via a design science research approach, we build and evaluate a sophisticated software system for the online provision of psychosocial healthcare to distributed and vulnerable populations. Multidisciplinary research capabilities are embedded within the system to investigate the effectiveness of online treatment protocols. Throughout the development cycles of the system, we build an emergent design theory of scrutiny that applies a multi-layer protocol to support governance of privacy and accountability in sensitive online applications. The design goal is to balance stakeholder privacy protections with the need to provide for accountable interventions in critical and well-defined care situations. The research implications for the development and governance of online applications in numerous privacy-sensitive application areas are explored","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"158 1","pages":"5"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85813160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To reconcile the personalization-privacy paradox, we adopt the privacy as a state view and define privacy as a state of information boundary rule-following. We further identify five types of boundaries underlying some of the important implicit rules of maintaining privacy: communication channel, platform, device, temporal, and purpose boundaries. Using an online vignette survey, we investigated how each of these boundary types affected users’ privacy perceptions when they were subjected to personalized advertisements. Using fixed- and random-effects models, we investigated how violating different boundary rules leads to changes in perceived privacy. Our results show that all five boundary types are significant predictors of perceived privacy within individuals. The communication channel, device, and business versus private purpose are significant predictors of perceived privacy across the whole sample. Temporal boundaries and platform boundaries failed to achieve statistical significance when evaluated simultaneously with the other factors across the whole sample. This means that for each individual, observing the rules of these five boundary types leads to higher perceived privacy than not observing these conditions. Taken as a whole, observing communication channel, device, and business versus private purpose boundaries also leads to higher averages of perceived privacy across the whole sample. Theoretical and practical implications are discussed based on the results
{"title":"Reconciling the Personalization-Privacy Paradox: Exploring Privacy Boundaries in Online Personalized Advertising","authors":"Yu-Qian Zhu, Kritsapas Kanjanamekanant, Yi-Te Chiu","doi":"10.17705/1jais.00775","DOIUrl":"https://doi.org/10.17705/1jais.00775","url":null,"abstract":"To reconcile the personalization-privacy paradox, we adopt the privacy as a state view and define privacy as a state of information boundary rule-following. We further identify five types of boundaries underlying some of the important implicit rules of maintaining privacy: communication channel, platform, device, temporal, and purpose boundaries. Using an online vignette survey, we investigated how each of these boundary types affected users’ privacy perceptions when they were subjected to personalized advertisements. Using fixed- and random-effects models, we investigated how violating different boundary rules leads to changes in perceived privacy. Our results show that all five boundary types are significant predictors of perceived privacy within individuals. The communication channel, device, and business versus private purpose are significant predictors of perceived privacy across the whole sample. Temporal boundaries and platform boundaries failed to achieve statistical significance when evaluated simultaneously with the other factors across the whole sample. This means that for each individual, observing the rules of these five boundary types leads to higher perceived privacy than not observing these conditions. Taken as a whole, observing communication channel, device, and business versus private purpose boundaries also leads to higher averages of perceived privacy across the whole sample. Theoretical and practical implications are discussed based on the results","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"25 1","pages":"1"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86044492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aim of fitness technologies, a combination of wearables and associated applications, is to support users’ health and fitness regimes. The market for fitness technologies continues to increase, and the technologies themselves are quickly advancing. However, it is unclear how effective fitness technologies are in generating wellness outcomes, and there is concern regarding frequent discontinuance behaviors. Accordingly, we develop a model to explain how the perception that fitness technologies satisfy or frustrate users’ basic psychological needs (BPNs) in exercise mediates the relationships between the users’ goals for fitness technology use and psychological well-being and continuance. We find that users who start using fitness technologies for enjoyment, challenge, revitalization, affiliation, or to make positive improvements to their health or strength and endurance, are more likely to report that the fitness technologies are satisfying their BPNs, whereas users who start using them for stress management, social recognition, competition, or weight management are more likely to report BPNs frustration. Notably, users who start using fitness technologies for enjoyment and to make positive improvements to their health or strength and endurance are less likely to report BPNs frustration, and use driven by social recognition goals can decrease BPNs satisfaction. BPNs satisfaction is associated with both increased psychological well-being and continuance, whereas BPNs frustration is negatively associated with both. Fitness technologies must thus be perceived by users to satisfy their BPNs (i.e., autonomy, competence, and relatedness) in exercise to ensure positive outcomes from use.
{"title":"The Mediating Role of Fitness Technology Enablement of Psychological Need Satisfaction and Frustration on the Relationship between Goals for Fitness Technology Use and Use Outcomes","authors":"T. James, F. Bélanger, P. Lowry","doi":"10.17705/1jais.00745","DOIUrl":"https://doi.org/10.17705/1jais.00745","url":null,"abstract":"The aim of fitness technologies, a combination of wearables and associated applications, is to support users’ health and fitness regimes. The market for fitness technologies continues to increase, and the technologies themselves are quickly advancing. However, it is unclear how effective fitness technologies are in generating wellness outcomes, and there is concern regarding frequent discontinuance behaviors. Accordingly, we develop a model to explain how the perception that fitness technologies satisfy or frustrate users’ basic psychological needs (BPNs) in exercise mediates the relationships between the users’ goals for fitness technology use and psychological well-being and continuance. We find that users who start using fitness technologies for enjoyment, challenge, revitalization, affiliation, or to make positive improvements to their health or strength and endurance, are more likely to report that the fitness technologies are satisfying their BPNs, whereas users who start using them for stress management, social recognition, competition, or weight management are more likely to report BPNs frustration. Notably, users who start using fitness technologies for enjoyment and to make positive improvements to their health or strength and endurance are less likely to report BPNs frustration, and use driven by social recognition goals can decrease BPNs satisfaction. BPNs satisfaction is associated with both increased psychological well-being and continuance, whereas BPNs frustration is negatively associated with both. Fitness technologies must thus be perceived by users to satisfy their BPNs (i.e., autonomy, competence, and relatedness) in exercise to ensure positive outcomes from use.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"3 1","pages":"4"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72756070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jian Mou, Jason F. Cohen, Anol Bhattacherjee, Jongki Kim
Information security is one of the important domains of information systems research today, with protection motivation theory (PMT) one of its most influential theoretical lenses. However, empirical findings based on PMT are often inconsistent and inconclusive. To reconcile these inconsistent findings, we conducted a meta-analysis to investigate the relationships among PMT constructs while also considering additional contextual constructs that are not specified in PMT. Ninety-two published studies were meta-analyzed and estimated using structural equation modeling. Our results provide support for three of the five predictors of security motivation intention, as postulated by PMT, mixed support for perceived vulnerability, and no support for response cost. We found that coping appraisal variables of response efficacy and self-efficacy have the largest average effects on security behavior. In addition, cultural attributes of collectivism and individualism moderated some of the pairwise correlations, PMT-theoretic relationships were generally stronger in personal contexts than in workplace contexts, and the intention-behavior relationship was strongest in workplace and compliance settings. Our results contribute to the information security literature by providing guidance for future PMT-related research and by demonstrating how meta-analysis and structural equation modeling can be combined to test theories in information systems research.
{"title":"A Test of Protection Motivation Theory in the Information Security Literature: A Meta-Analytic Structural Equation Modeling Approach","authors":"Jian Mou, Jason F. Cohen, Anol Bhattacherjee, Jongki Kim","doi":"10.17705/1JAIS.00723","DOIUrl":"https://doi.org/10.17705/1JAIS.00723","url":null,"abstract":"Information security is one of the important domains of information systems research today, with protection motivation theory (PMT) one of its most influential theoretical lenses. However, empirical findings based on PMT are often inconsistent and inconclusive. To reconcile these inconsistent findings, we conducted a meta-analysis to investigate the relationships among PMT constructs while also considering additional contextual constructs that are not specified in PMT. Ninety-two published studies were meta-analyzed and estimated using structural equation modeling. Our results provide support for three of the five predictors of security motivation intention, as postulated by PMT, mixed support for perceived vulnerability, and no support for response cost. We found that coping appraisal variables of response efficacy and self-efficacy have the largest average effects on security behavior. In addition, cultural attributes of collectivism and individualism moderated some of the pairwise correlations, PMT-theoretic relationships were generally stronger in personal contexts than in workplace contexts, and the intention-behavior relationship was strongest in workplace and compliance settings. Our results contribute to the information security literature by providing guidance for future PMT-related research and by demonstrating how meta-analysis and structural equation modeling can be combined to test theories in information systems research.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"28 1","pages":"6"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78069436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
While much is known about the beneficial effects of agile information systems development (ISD), scholars have largely neglected to address its potential downsides. Specifically, research on this topic has thus far overlooked the ambivalent implications of the specific demands placed on developers working in agile ISD teams, including potentially depleting effects. Drawing on ego depletion theory and the associated literature, we provide a more balanced view and introduce self-regulatory resource depletion triggered by using agile ISD practices—encompassing software development (SD) and project management (PM) practices—as a theoretical perspective on why agile developers experience different levels of work-related fatigue that lead to stronger or weaker turnover intentions. Furthermore, we propose that due to the specific way in which agile ISD methods organize ISD project work, developers’ perceived workload influences the intensity by which agile ISD practices affect self-regulatory resources and developers’ feelings of fatigue. We examined our research model using a multimethod approach including quantitative and qualitative data. We found that the use of agile SD practices enhances developers’ self-regulatory resources and reduces fatigue and turnover intention. Our results also show that perceived workload strengthens the energizing effects of the use of agile SD practices and reveals a depleting effect of the use of agile PM practices, with countervailing implications for turnover intention. This study contributes to agile ISD literature by drawing a more nuanced and balanced picture with both resource-enhancing and resource-draining effects of the use of agile ISD practices. Finally, we give managerial advice regarding factors to consider when designing and managing agile ISD projects.
{"title":"Too Drained from Being Agile? The Self-Regulatory Effects of the Use of Agile ISD Practices and their Consequences on Turnover Intention","authors":"L. Mueller, Alexander Benlian","doi":"10.17705/1jais.00766","DOIUrl":"https://doi.org/10.17705/1jais.00766","url":null,"abstract":"While much is known about the beneficial effects of agile information systems development (ISD), scholars have largely neglected to address its potential downsides. Specifically, research on this topic has thus far overlooked the ambivalent implications of the specific demands placed on developers working in agile ISD teams, including potentially depleting effects. Drawing on ego depletion theory and the associated literature, we provide a more balanced view and introduce self-regulatory resource depletion triggered by using agile ISD practices—encompassing software development (SD) and project management (PM) practices—as a theoretical perspective on why agile developers experience different levels of work-related fatigue that lead to stronger or weaker turnover intentions. Furthermore, we propose that due to the specific way in which agile ISD methods organize ISD project work, developers’ perceived workload influences the intensity by which agile ISD practices affect self-regulatory resources and developers’ feelings of fatigue. We examined our research model using a multimethod approach including quantitative and qualitative data. We found that the use of agile SD practices enhances developers’ self-regulatory resources and reduces fatigue and turnover intention. Our results also show that perceived workload strengthens the energizing effects of the use of agile SD practices and reveals a depleting effect of the use of agile PM practices, with countervailing implications for turnover intention. This study contributes to agile ISD literature by drawing a more nuanced and balanced picture with both resource-enhancing and resource-draining effects of the use of agile ISD practices. Finally, we give managerial advice regarding factors to consider when designing and managing agile ISD projects.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"120 7 1","pages":"7"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80184552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dong-Heon Kwak, Shuyuan Deng, Jungwon Kuem, Sung S. Kim
{"title":"How to Achieve Goals in Digital Games: An Empirical Test of a Goal-Oriented Model in Pokemon GO","authors":"Dong-Heon Kwak, Shuyuan Deng, Jungwon Kuem, Sung S. Kim","doi":"10.2139/ssrn.3857270","DOIUrl":"https://doi.org/10.2139/ssrn.3857270","url":null,"abstract":"","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"12 1","pages":"2"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74429169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Incumbent companies across industries such as banking, insurance, and enterprise software have begun transforming their existing product platform ecosystems into innovation platforms ecosystems to increase generativity in their ecosystems. Such ecosystem transformations not only entail technological challenges as the underlying platform technology changes but also organizational challenges in that ecosystem actors such as partners and customers need to become part of the transformed ecosystem. To study how incumbent companies can govern ecosystem transformations successfully, we interpret ecosystems as organizational fields and ecosystem transformations as changes to the fields’ institutional infrastructure. Based on a multiyear, grounded theory study of the transformation of SAP’s on-premises ERP system, we first identify institutionalization challenges that arise when institutional infrastructure is changed during an ecosystem transformation. We then show how field-level governance mechanisms address these challenges and how the new institutional infrastructure gains legitimacy among ecosystem actors, ultimately leading to the institutionalization of the transformed ecosystem. These findings contribute to the literature on ecosystem transformations and platform governance by highlighting the role that institutional forces play in ecosystem transformations. Furthermore, we add to the literature on institutional theory by providing insights into the dynamics of institutional infrastructure as it becomes infused with digital technologies.
{"title":"From Product Platform Ecosystem to Innovation Platform Ecosystem: An Institutional Perspective on the Governance of Ecosystem Transformations","authors":"Maximilian Schreieck, Manuel Wiesche, H. Krcmar","doi":"10.17705/1jais.00764","DOIUrl":"https://doi.org/10.17705/1jais.00764","url":null,"abstract":"Incumbent companies across industries such as banking, insurance, and enterprise software have begun transforming their existing product platform ecosystems into innovation platforms ecosystems to increase generativity in their ecosystems. Such ecosystem transformations not only entail technological challenges as the underlying platform technology changes but also organizational challenges in that ecosystem actors such as partners and customers need to become part of the transformed ecosystem. To study how incumbent companies can govern ecosystem transformations successfully, we interpret ecosystems as organizational fields and ecosystem transformations as changes to the fields’ institutional infrastructure. Based on a multiyear, grounded theory study of the transformation of SAP’s on-premises ERP system, we first identify institutionalization challenges that arise when institutional infrastructure is changed during an ecosystem transformation. We then show how field-level governance mechanisms address these challenges and how the new institutional infrastructure gains legitimacy among ecosystem actors, ultimately leading to the institutionalization of the transformed ecosystem. These findings contribute to the literature on ecosystem transformations and platform governance by highlighting the role that institutional forces play in ecosystem transformations. Furthermore, we add to the literature on institutional theory by providing insights into the dynamics of institutional infrastructure as it becomes infused with digital technologies.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"11 1","pages":"9"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88681851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Scholars and practitioners have long tried to understand the antecedents and consequences of information technology (IT) assimilation. Studies suggest that top management support is an important driver of IT assimilation; however, this broad takeaway provides little substantive guidance to researchers and practitioners. We also have a limited understanding of whether and when IT assimilation creates business value. We take stock of this literature with a meta-analysis. We found that top management support is positively related to IT assimilation, and assimilation is in turn positively related to the business value of IT. We also found that explicit support does not have any special effect on IT assimilation (compared to implicit support) and may not be related to business value at all. However, our results indicate that IT assimilation has a stronger effect on business value at the process level (versus firm level) and for enterprise IT innovations (versus function IT innovations). Finally, we found that support-assimilation and assimilation-value relationships are stronger in high (versus low) power distance cultures. Our collective findings can facilitate future research and help practitioners navigate IT assimilation initiatives.
{"title":"Assessing the Connections among Top Management Support, IT Assimilation, and the Business Value of IT: A Meta-Analysis","authors":"Nicholas H. Roberts, A. Jeyaraj, J. Pullin","doi":"10.17705/1jais.00772","DOIUrl":"https://doi.org/10.17705/1jais.00772","url":null,"abstract":"Scholars and practitioners have long tried to understand the antecedents and consequences of information technology (IT) assimilation. Studies suggest that top management support is an important driver of IT assimilation; however, this broad takeaway provides little substantive guidance to researchers and practitioners. We also have a limited understanding of whether and when IT assimilation creates business value. We take stock of this literature with a meta-analysis. We found that top management support is positively related to IT assimilation, and assimilation is in turn positively related to the business value of IT. We also found that explicit support does not have any special effect on IT assimilation (compared to implicit support) and may not be related to business value at all. However, our results indicate that IT assimilation has a stronger effect on business value at the process level (versus firm level) and for enterprise IT innovations (versus function IT innovations). Finally, we found that support-assimilation and assimilation-value relationships are stronger in high (versus low) power distance cultures. Our collective findings can facilitate future research and help practitioners navigate IT assimilation initiatives.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"35 1","pages":"6"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82644269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}