Blue-collar remote and mobile workers (BC-RMWs) such as repair/installation engineers, delivery drivers, and construction workers, constitute a significant share of the workforce. They work away from a home or office work base at customer and remote work sites and are highly dependent on ICT for completing their work tasks. Low occupational well-being is a key concern regarding BC-RMWs. The objective of this research is to understand how BC-RMWs can use information and communication technology (ICT) to elevate their occupational well-being. Drawing from the job demands-job resources theoretical framework in occupational psychology, we theorize that the distinctive work characteristics faced by BC-RMWs can be viewed in the conceptual framing of job demands. We conceptualize BC-RMWs’ practices of ICT use as possible ways to gather resources to tackle these demands. We conducted a study of 28 BC-RMWs employed in two private sector firms (telecom service provision and construction industries) in the UK across 14 remote work sites. Based on our findings, we developed the concept of ICT-enabled job crafting and theorized how ICT-enabled job crafting by BC-RMWs can help them increase their job resources to tackle their job demands and consequently increase their occupational well-being. The empirical context of the paper, i.e., the study of BC-RMWs, provides further novelty because these kinds of workers and their distinctive and interesting work conditions have not received much attention in the literature.
{"title":"Remote, Mobile, and Blue-Collar: ICT-Enabled Job Crafting to Elevate Occupational Well-Being","authors":"Monideepa Tarafdar, Carol Saunders","doi":"10.17705/1jais.00738","DOIUrl":"https://doi.org/10.17705/1jais.00738","url":null,"abstract":"Blue-collar remote and mobile workers (BC-RMWs) such as repair/installation engineers, delivery drivers, and construction workers, constitute a significant share of the workforce. They work away from a home or office work base at customer and remote work sites and are highly dependent on ICT for completing their work tasks. Low occupational well-being is a key concern regarding BC-RMWs. The objective of this research is to understand how BC-RMWs can use information and communication technology (ICT) to elevate their occupational well-being. Drawing from the job demands-job resources theoretical framework in occupational psychology, we theorize that the distinctive work characteristics faced by BC-RMWs can be viewed in the conceptual framing of job demands. We conceptualize BC-RMWs’ practices of ICT use as possible ways to gather resources to tackle these demands. We conducted a study of 28 BC-RMWs employed in two private sector firms (telecom service provision and construction industries) in the UK across 14 remote work sites. Based on our findings, we developed the concept of ICT-enabled job crafting and theorized how ICT-enabled job crafting by BC-RMWs can help them increase their job resources to tackle their job demands and consequently increase their occupational well-being. The empirical context of the paper, i.e., the study of BC-RMWs, provides further novelty because these kinds of workers and their distinctive and interesting work conditions have not received much attention in the literature.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"2015 1","pages":"4"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87253057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Scholarly writing is a difficult skill to develop. This editorial presents our observations on how to move from acceptable to exceptional writing in academic manuscripts. We discuss three phases of writing—the predrafting, drafting, and postdrafting phases—and provide suggestions based on our experiences for improving the quality of academic manuscripts prior to their submission.
{"title":"On Scholarly Composition: From Acceptable to Exceptional","authors":"D. Leidner, Monica Birth","doi":"10.17705/1jais.00799","DOIUrl":"https://doi.org/10.17705/1jais.00799","url":null,"abstract":"Scholarly writing is a difficult skill to develop. This editorial presents our observations on how to move from acceptable to exceptional writing in academic manuscripts. We discuss three phases of writing—the predrafting, drafting, and postdrafting phases—and provide suggestions based on our experiences for improving the quality of academic manuscripts prior to their submission.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"6 1","pages":"10"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74825729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Research has shown that many people use social networking sites (SNS) excessively, which may lead to various negative consequences. With the aim of reducing SNS addition, this study investigates the role of SNS characteristics in the formation of SNS addiction. By applying incentive sensitization theory in the context of SNS addiction, we suggest that the compulsive motivation for using an SNS is developed by pleasurable and rewarding SNS use experiences. Social network characteristics and communication characteristics, which determine the rewards that users obtain from SNS use, moderate the relationship between habitual SNS use and SNS addiction. We develop novel behavioral measures of habitual SNS use and SNS addiction based on SNS activity logs and empirically test the research model using a large and unique dataset. Besides contributing to the theoretical development of SNS addiction, the results of this study offer practical options to help prevent SNS addiction. Moreover, the measures of SNS addiction enable the automated monitoring of user behavior on SNS, which could be useful for detecting potential SNS addicts.
{"title":"Why Are People Addicted to SNS? Understanding the Role of SNS Characteristics in the Formation of SNS Addiction","authors":"Haifeng Xu, T. Phan, B. Tan","doi":"10.17705/1JAIS.00735","DOIUrl":"https://doi.org/10.17705/1JAIS.00735","url":null,"abstract":"Research has shown that many people use social networking sites (SNS) excessively, which may lead to various negative consequences. With the aim of reducing SNS addition, this study investigates the role of SNS characteristics in the formation of SNS addiction. By applying incentive sensitization theory in the context of SNS addiction, we suggest that the compulsive motivation for using an SNS is developed by pleasurable and rewarding SNS use experiences. Social network characteristics and communication characteristics, which determine the rewards that users obtain from SNS use, moderate the relationship between habitual SNS use and SNS addiction. We develop novel behavioral measures of habitual SNS use and SNS addiction based on SNS activity logs and empirically test the research model using a large and unique dataset. Besides contributing to the theoretical development of SNS addiction, the results of this study offer practical options to help prevent SNS addiction. Moreover, the measures of SNS addiction enable the automated monitoring of user behavior on SNS, which could be useful for detecting potential SNS addicts.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"65 1","pages":"1"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88899454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper investigates how information systems design professionals use design principles (extracted from a prior design science research project) in a new design situation. We do this by capturing think-aloud protocols from experienced design professionals who are given access to potentially useful design principles. Our analysis identifies two dimensions of use: design behaviors (what designers do) and application modes (how designers apply the principles). Mapping across the dimensions suggests two use pathways: forward chaining and backward chaining. Our study shows how empirically studying expert designers can shed light on the microprocesses of design principles in use, and how an empirical turn in the investigation can contribute to clarifying the fundamental nature of design principles. We conclude by highlighting the implications of these insights for crafting more useful design principles.
{"title":"How Designers Use Design Principles: Design Behaviors and Application Modes","authors":"Leona Chandra Kruse, S. Purao, S. Seidel","doi":"10.17705/1jais.00759","DOIUrl":"https://doi.org/10.17705/1jais.00759","url":null,"abstract":"This paper investigates how information systems design professionals use design principles (extracted from a prior design science research project) in a new design situation. We do this by capturing think-aloud protocols from experienced design professionals who are given access to potentially useful design principles. Our analysis identifies two dimensions of use: design behaviors (what designers do) and application modes (how designers apply the principles). Mapping across the dimensions suggests two use pathways: forward chaining and backward chaining. Our study shows how empirically studying expert designers can shed light on the microprocesses of design principles in use, and how an empirical turn in the investigation can contribute to clarifying the fundamental nature of design principles. We conclude by highlighting the implications of these insights for crafting more useful design principles.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"4 1","pages":"3"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87808789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Because most real-world domains intended to be supported by an information system are complex, practitioners often use multiple different types of conceptual modeling scripts to understand them. We performed two experiments to examine how two theoretical factors of multiple scripts— combined ontological completeness and ontological overlap—influence how users develop an understanding of a real-world domain from multiple scripts. Results of the first experiment show that to some degree, ontological overlap improves participants’ understanding of a domain, more so than combined ontological completeness. In the second experiment, we tracked the eye movement data of participants to understand how ontological overlap between scripts impacts users’ information search and cognitive integration processes. We found that some occurrence of semantically similar constructs between scripts helps individuals to identify and relate constructs presented in different scripts. Users, therefore, can identify and focus on script areas that are relevant to their problem tasks. However, a high level of ontological overlap decreases the attention paid by participants to relevant task-specific areas because they spend more time searching for relevant information. Together, our findings both refine and extend existing conceptual modeling theory. We clarify the dialectics between the full and parsimonious real-world representations offered through multiple scripts and the individual’s understanding of the domain that is represented by those scripts.
{"title":"How Do Individuals Understand Multiple Conceptual Modeling Scripts?","authors":"M. Jabbari, J. Recker, Peter F. Green, K. Werder","doi":"10.17705/1jais.00750","DOIUrl":"https://doi.org/10.17705/1jais.00750","url":null,"abstract":"Because most real-world domains intended to be supported by an information system are complex, practitioners often use multiple different types of conceptual modeling scripts to understand them. We performed two experiments to examine how two theoretical factors of multiple scripts— combined ontological completeness and ontological overlap—influence how users develop an understanding of a real-world domain from multiple scripts. Results of the first experiment show that to some degree, ontological overlap improves participants’ understanding of a domain, more so than combined ontological completeness. In the second experiment, we tracked the eye movement data of participants to understand how ontological overlap between scripts impacts users’ information search and cognitive integration processes. We found that some occurrence of semantically similar constructs between scripts helps individuals to identify and relate constructs presented in different scripts. Users, therefore, can identify and focus on script areas that are relevant to their problem tasks. However, a high level of ontological overlap decreases the attention paid by participants to relevant task-specific areas because they spend more time searching for relevant information. Together, our findings both refine and extend existing conceptual modeling theory. We clarify the dialectics between the full and parsimonious real-world representations offered through multiple scripts and the individual’s understanding of the domain that is represented by those scripts.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":" 12","pages":"1"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72377658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yangjun Li, Christy M. K. Cheung, Xiao-Liang Shen, Matthew K. O. Lee
Although collective trolling poses a growing threat to both individuals and virtual community owners, the information systems (IS) literature lacks a rich theorization of this phenomenon. To address the research gaps, we introduce the concept of we-intention to capture the collective nature of collective trolling in virtual communities. We also integrate the social identity model of deindividuation effects (SIDE) and situational action theory to invoke the sociotechnical perspective in theorizing collective trolling in virtual communities. The objective of this study is to use the sociotechnical perspective to understand the we-intention to participate in collective trolling in virtual communities. We test our proposed model using data gathered from 377 Reddit users. Our moderated mediation analysis elaborates how technical elements (i.e., anonymity of self and anonymity of others) influence the we-intention to participate in collective trolling via individual-based social elements (i.e., perceived online disinhibition and social identity), with an environment-based social element (i.e., the absence of capable guardianship) as a boundary condition. We contribute to research by explaining collective trolling in virtual communities from the group-referent intentional action perspective and sociotechnical perspective. We also offer practical insights into ways to combat collective trolling in virtual communities.
{"title":"When Socialization Goes Wrong: Understanding the We-Intention to Participate in Collective Trolling in Virtual Communities","authors":"Yangjun Li, Christy M. K. Cheung, Xiao-Liang Shen, Matthew K. O. Lee","doi":"10.17705/1JAIS.00737","DOIUrl":"https://doi.org/10.17705/1JAIS.00737","url":null,"abstract":"Although collective trolling poses a growing threat to both individuals and virtual community owners, the information systems (IS) literature lacks a rich theorization of this phenomenon. To address the research gaps, we introduce the concept of we-intention to capture the collective nature of collective trolling in virtual communities. We also integrate the social identity model of deindividuation effects (SIDE) and situational action theory to invoke the sociotechnical perspective in theorizing collective trolling in virtual communities. The objective of this study is to use the sociotechnical perspective to understand the we-intention to participate in collective trolling in virtual communities. We test our proposed model using data gathered from 377 Reddit users. Our moderated mediation analysis elaborates how technical elements (i.e., anonymity of self and anonymity of others) influence the we-intention to participate in collective trolling via individual-based social elements (i.e., perceived online disinhibition and social identity), with an environment-based social element (i.e., the absence of capable guardianship) as a boundary condition. We contribute to research by explaining collective trolling in virtual communities from the group-referent intentional action perspective and sociotechnical perspective. We also offer practical insights into ways to combat collective trolling in virtual communities.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"2072 1","pages":"5"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86550681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Online experiments have become an important methodology in the study of human behavior. While social scientists have been quick to capitalize on the benefits of online experiments, information systems (IS) researchers seem to be among the laggards in taking advantage of this emerging paradigm, despite having the research motivations and technological capabilities to be among the leaders. A major reason for this gap is probably the secondary role traditionally attributed in IS research to experimental methods, as repeatedly demonstrated in methodological reviews of work published in major IS publication outlets. The purpose of this editorial is to encourage IS researchers interested in online behavior to adopt online experiments as a primary methodology, which may substitute for traditional lab experiments and complement nonexperimental methods. This purpose is pursued by analyzing why IS research has lagged behind neighboring disciplines in adopting experimental methods, what IS research can benefit from utilizing online experiments, and how IS research can reap these benefits. The prescriptive analysis is structured around key considerations that should be taken into account in using online experiments to study online behavior.
{"title":"Why and How Online Experiments Can Benefit Information Systems Research","authors":"L. Fink","doi":"10.17705/1jais.00787","DOIUrl":"https://doi.org/10.17705/1jais.00787","url":null,"abstract":"Online experiments have become an important methodology in the study of human behavior. While social scientists have been quick to capitalize on the benefits of online experiments, information systems (IS) researchers seem to be among the laggards in taking advantage of this emerging paradigm, despite having the research motivations and technological capabilities to be among the leaders. A major reason for this gap is probably the secondary role traditionally attributed in IS research to experimental methods, as repeatedly demonstrated in methodological reviews of work published in major IS publication outlets. The purpose of this editorial is to encourage IS researchers interested in online behavior to adopt online experiments as a primary methodology, which may substitute for traditional lab experiments and complement nonexperimental methods. This purpose is pursued by analyzing why IS research has lagged behind neighboring disciplines in adopting experimental methods, what IS research can benefit from utilizing online experiments, and how IS research can reap these benefits. The prescriptive analysis is structured around key considerations that should be taken into account in using online experiments to study online behavior.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"16 1","pages":"11"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86855258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Despite the increased focus on organizational security policies and programs, some employees continue to engage in maladaptive responses to security measures (i.e., behaviors other than those recommended, intended, or prescribed). To help shed light on insiders’ adaptive and maladaptive responses to IS security measures, we conducted a case study of an organization at the forefront of security policy initiatives. Drawing on the beliefs-actions-outcomes (BAO) model to analyze our case data, we uncover a potentially nonvirtuous cycle consisting of security-related beliefs, actions, and outcomes, which we refer to as an “adversarial dance.” Explaining our results, we describe a novel belief framework that identifies four security belief profiles and uncovers an underexplored outcome of IS security: insiders’ lived security experiences. We find that individuals’ unfavorable lived security experiences produce counterproductive security-related beliefs that, in turn, lead to maladaptive behaviors. Maladaptive behaviors create new potential for security risk, leading to increased organizational security measures to counter them. Thus, the adversarial dance continues, as the new security measures have the potential to reinforce counterproductive security-related beliefs about the importance and risk of IS security and lead to new maladaptive behaviors. To help situate our findings within the current security literature, we integrate the results with prior research based on extant theories. While this paper is not the first to suggest that security measures can elicit maladaptive behaviors, the emergent belief framework and expanded BAO model of IS security constitute an important contribution to the behavioral IS security literature.
{"title":"An Adversarial Dance: Toward an Understanding of Insiders' Responses to Organizational Information Security Measures","authors":"P. Balozian, A. Burns, D. Leidner","doi":"10.17705/1jais.00798","DOIUrl":"https://doi.org/10.17705/1jais.00798","url":null,"abstract":"Despite the increased focus on organizational security policies and programs, some employees continue to engage in maladaptive responses to security measures (i.e., behaviors other than those recommended, intended, or prescribed). To help shed light on insiders’ adaptive and maladaptive responses to IS security measures, we conducted a case study of an organization at the forefront of security policy initiatives. Drawing on the beliefs-actions-outcomes (BAO) model to analyze our case data, we uncover a potentially nonvirtuous cycle consisting of security-related beliefs, actions, and outcomes, which we refer to as an “adversarial dance.” Explaining our results, we describe a novel belief framework that identifies four security belief profiles and uncovers an underexplored outcome of IS security: insiders’ lived security experiences. We find that individuals’ unfavorable lived security experiences produce counterproductive security-related beliefs that, in turn, lead to maladaptive behaviors. Maladaptive behaviors create new potential for security risk, leading to increased organizational security measures to counter them. Thus, the adversarial dance continues, as the new security measures have the potential to reinforce counterproductive security-related beliefs about the importance and risk of IS security and lead to new maladaptive behaviors. To help situate our findings within the current security literature, we integrate the results with prior research based on extant theories. While this paper is not the first to suggest that security measures can elicit maladaptive behaviors, the emergent belief framework and expanded BAO model of IS security constitute an important contribution to the behavioral IS security literature.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"108 1","pages":"4"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90104341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Considering a two-sided software platform with software developers on one side and software users on the other, we study whether the platform should adopt a penetration pricing strategy or skimming pricing strategy on the developer side. We propose a two-period analytical model with asymmetric cross-side network effects to analyze the platform’s optimal pricing strategy. Our analysis reveals that the platform should adopt a penetration pricing strategy if the user-to-developer network effect is strong and a skimming pricing strategy otherwise. If the platform does not charge users an access fee, the platform should consider subsidizing developers’ access in the first period only. However, when the platform charges users an access fee, subsidizing developers’ access in both periods can be viable for the platform. Charging the software user an access fee incentivizes the platform to subsidize developers in the first period if the user-to-developer network effect is weak. Finally, this study reveals that the optimal access fee charged or subsidy provided to developers in the two periods is determined by several key factors: developers’ basic expectations about the revenue to be gained from the platform (optimistic or pessimistic), intensities of cross-side network effects, the lengths of the two periods, and the access fee charged to users.
{"title":"Penetration or Skimming? Pricing Strategies for Software Platforms Considering Asymmetric Cross-Side Network Effects","authors":"Nan Yuan, Haiyang Feng, Minqiang Li, Nan Feng","doi":"10.17705/1jais.00748","DOIUrl":"https://doi.org/10.17705/1jais.00748","url":null,"abstract":"Considering a two-sided software platform with software developers on one side and software users on the other, we study whether the platform should adopt a penetration pricing strategy or skimming pricing strategy on the developer side. We propose a two-period analytical model with asymmetric cross-side network effects to analyze the platform’s optimal pricing strategy. Our analysis reveals that the platform should adopt a penetration pricing strategy if the user-to-developer network effect is strong and a skimming pricing strategy otherwise. If the platform does not charge users an access fee, the platform should consider subsidizing developers’ access in the first period only. However, when the platform charges users an access fee, subsidizing developers’ access in both periods can be viable for the platform. Charging the software user an access fee incentivizes the platform to subsidize developers in the first period if the user-to-developer network effect is weak. Finally, this study reveals that the optimal access fee charged or subsidy provided to developers in the two periods is determined by several key factors: developers’ basic expectations about the revenue to be gained from the platform (optimistic or pessimistic), intensities of cross-side network effects, the lengths of the two periods, and the access fee charged to users.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"15 1","pages":"3"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79957254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The transition to renewable energy requires organizations and governments to formulate and enact new energy policies. This emerging energy era is characterized by higher levels of supply and demand intermittency, which requires information systems to manage the electricity grid. We propose key policy elements for managing intermittency based on information systems to implement digital mirror actions for managing the production, consumption, and transfer of electricity and market mechanisms for maintaining grid equilibrium. This article discusses these and their energy policy implications.
{"title":"Sustainable Energy Transition: Intermittency Policy Based on Digital Mirror Actions","authors":"R. Watson, W. Ketter, J. Recker, S. Seidel","doi":"10.17705/1jais.00752","DOIUrl":"https://doi.org/10.17705/1jais.00752","url":null,"abstract":"The transition to renewable energy requires organizations and governments to formulate and enact new energy policies. This emerging energy era is characterized by higher levels of supply and demand intermittency, which requires information systems to manage the electricity grid. We propose key policy elements for managing intermittency based on information systems to implement digital mirror actions for managing the production, consumption, and transfer of electricity and market mechanisms for maintaining grid equilibrium. This article discusses these and their energy policy implications.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"32 1","pages":"7"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79350757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}