首页 > 最新文献

Journal of the Association for Information Systems最新文献

英文 中文
Remote, Mobile, and Blue-Collar: ICT-Enabled Job Crafting to Elevate Occupational Well-Being 远程、移动和蓝领:信息通信技术支持的工作塑造提升职业福祉
IF 5.8 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.17705/1jais.00738
Monideepa Tarafdar, Carol Saunders
Blue-collar remote and mobile workers (BC-RMWs) such as repair/installation engineers, delivery drivers, and construction workers, constitute a significant share of the workforce. They work away from a home or office work base at customer and remote work sites and are highly dependent on ICT for completing their work tasks. Low occupational well-being is a key concern regarding BC-RMWs. The objective of this research is to understand how BC-RMWs can use information and communication technology (ICT) to elevate their occupational well-being. Drawing from the job demands-job resources theoretical framework in occupational psychology, we theorize that the distinctive work characteristics faced by BC-RMWs can be viewed in the conceptual framing of job demands. We conceptualize BC-RMWs’ practices of ICT use as possible ways to gather resources to tackle these demands. We conducted a study of 28 BC-RMWs employed in two private sector firms (telecom service provision and construction industries) in the UK across 14 remote work sites. Based on our findings, we developed the concept of ICT-enabled job crafting and theorized how ICT-enabled job crafting by BC-RMWs can help them increase their job resources to tackle their job demands and consequently increase their occupational well-being. The empirical context of the paper, i.e., the study of BC-RMWs, provides further novelty because these kinds of workers and their distinctive and interesting work conditions have not received much attention in the literature.
蓝领远程和移动工人(bc - rmw),如维修/安装工程师、送货司机和建筑工人,构成了劳动力的重要份额。他们在客户和远程工作地点远离家庭或办公室工作基地,高度依赖信息通信技术来完成工作任务。低职业幸福感是bc - rmw的一个关键问题。本研究的目的是了解bc - rmw如何使用信息通信技术(ICT)来提升他们的职业幸福感。根据职业心理学的工作需求-工作资源理论框架,我们认为bc - rmw所面临的独特的工作特征可以从工作需求的概念框架中来看待。我们将bc - rmw的信息通信技术使用实践概念化为收集资源以应对这些需求的可能方式。我们对英国两家私营公司(电信服务提供和建筑行业)在14个远程工作地点雇用的28名bc - rmw进行了研究。基于我们的研究结果,我们提出了信息通信技术支持的工作制作概念,并对bc - rmw的信息通信技术支持的工作制作如何帮助他们增加工作资源,以满足他们的工作需求,从而提高他们的职业幸福感进行了理论分析。本文的实证背景,即bc - rmw的研究,提供了进一步的新新性,因为这些类型的工人和他们独特而有趣的工作条件在文献中没有得到太多的关注。
{"title":"Remote, Mobile, and Blue-Collar: ICT-Enabled Job Crafting to Elevate Occupational Well-Being","authors":"Monideepa Tarafdar, Carol Saunders","doi":"10.17705/1jais.00738","DOIUrl":"https://doi.org/10.17705/1jais.00738","url":null,"abstract":"Blue-collar remote and mobile workers (BC-RMWs) such as repair/installation engineers, delivery drivers, and construction workers, constitute a significant share of the workforce. They work away from a home or office work base at customer and remote work sites and are highly dependent on ICT for completing their work tasks. Low occupational well-being is a key concern regarding BC-RMWs. The objective of this research is to understand how BC-RMWs can use information and communication technology (ICT) to elevate their occupational well-being. Drawing from the job demands-job resources theoretical framework in occupational psychology, we theorize that the distinctive work characteristics faced by BC-RMWs can be viewed in the conceptual framing of job demands. We conceptualize BC-RMWs’ practices of ICT use as possible ways to gather resources to tackle these demands. We conducted a study of 28 BC-RMWs employed in two private sector firms (telecom service provision and construction industries) in the UK across 14 remote work sites. Based on our findings, we developed the concept of ICT-enabled job crafting and theorized how ICT-enabled job crafting by BC-RMWs can help them increase their job resources to tackle their job demands and consequently increase their occupational well-being. The empirical context of the paper, i.e., the study of BC-RMWs, provides further novelty because these kinds of workers and their distinctive and interesting work conditions have not received much attention in the literature.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"2015 1","pages":"4"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87253057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On Scholarly Composition: From Acceptable to Exceptional 论学术作文:从可接受到例外
IF 5.8 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.17705/1jais.00799
D. Leidner, Monica Birth
Scholarly writing is a difficult skill to develop. This editorial presents our observations on how to move from acceptable to exceptional writing in academic manuscripts. We discuss three phases of writing—the predrafting, drafting, and postdrafting phases—and provide suggestions based on our experiences for improving the quality of academic manuscripts prior to their submission.
学术写作是一项很难培养的技能。这篇社论提出了我们对如何从可接受到卓越的学术手稿写作的观察。我们讨论了写作的三个阶段——起草前、起草中和起草后阶段,并根据我们的经验提供建议,以提高学术论文提交前的质量。
{"title":"On Scholarly Composition: From Acceptable to Exceptional","authors":"D. Leidner, Monica Birth","doi":"10.17705/1jais.00799","DOIUrl":"https://doi.org/10.17705/1jais.00799","url":null,"abstract":"Scholarly writing is a difficult skill to develop. This editorial presents our observations on how to move from acceptable to exceptional writing in academic manuscripts. We discuss three phases of writing—the predrafting, drafting, and postdrafting phases—and provide suggestions based on our experiences for improving the quality of academic manuscripts prior to their submission.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"6 1","pages":"10"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74825729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why Are People Addicted to SNS? Understanding the Role of SNS Characteristics in the Formation of SNS Addiction 为什么人们会沉迷于社交网络?了解社交网络特征在社交网络成瘾形成中的作用
IF 5.8 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.17705/1JAIS.00735
Haifeng Xu, T. Phan, B. Tan
Research has shown that many people use social networking sites (SNS) excessively, which may lead to various negative consequences. With the aim of reducing SNS addition, this study investigates the role of SNS characteristics in the formation of SNS addiction. By applying incentive sensitization theory in the context of SNS addiction, we suggest that the compulsive motivation for using an SNS is developed by pleasurable and rewarding SNS use experiences. Social network characteristics and communication characteristics, which determine the rewards that users obtain from SNS use, moderate the relationship between habitual SNS use and SNS addiction. We develop novel behavioral measures of habitual SNS use and SNS addiction based on SNS activity logs and empirically test the research model using a large and unique dataset. Besides contributing to the theoretical development of SNS addiction, the results of this study offer practical options to help prevent SNS addiction. Moreover, the measures of SNS addiction enable the automated monitoring of user behavior on SNS, which could be useful for detecting potential SNS addicts.
研究表明,许多人过度使用社交网站(SNS),这可能会导致各种负面后果。为了减少社交网络的使用,本研究探讨了社交网络特征在社交网络成瘾形成中的作用。通过将激励敏化理论应用于社交网络成瘾,我们认为使用社交网络的强迫性动机是由愉快和奖励的社交网络使用体验形成的。社交网络特征和交流特征决定了用户从SNS使用中获得的奖励,调节了习惯性SNS使用与SNS成瘾之间的关系。我们开发了基于SNS活动日志的习惯性SNS使用和SNS成瘾的新行为测量方法,并使用一个庞大而独特的数据集对研究模型进行了实证检验。除了有助于SNS成瘾的理论发展外,本研究的结果还为帮助预防SNS成瘾提供了实际的选择。此外,社交网络成瘾的测量能够自动监测用户在社交网络上的行为,这可能有助于发现潜在的社交网络成瘾者。
{"title":"Why Are People Addicted to SNS? Understanding the Role of SNS Characteristics in the Formation of SNS Addiction","authors":"Haifeng Xu, T. Phan, B. Tan","doi":"10.17705/1JAIS.00735","DOIUrl":"https://doi.org/10.17705/1JAIS.00735","url":null,"abstract":"Research has shown that many people use social networking sites (SNS) excessively, which may lead to various negative consequences. With the aim of reducing SNS addition, this study investigates the role of SNS characteristics in the formation of SNS addiction. By applying incentive sensitization theory in the context of SNS addiction, we suggest that the compulsive motivation for using an SNS is developed by pleasurable and rewarding SNS use experiences. Social network characteristics and communication characteristics, which determine the rewards that users obtain from SNS use, moderate the relationship between habitual SNS use and SNS addiction. We develop novel behavioral measures of habitual SNS use and SNS addiction based on SNS activity logs and empirically test the research model using a large and unique dataset. Besides contributing to the theoretical development of SNS addiction, the results of this study offer practical options to help prevent SNS addiction. Moreover, the measures of SNS addiction enable the automated monitoring of user behavior on SNS, which could be useful for detecting potential SNS addicts.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"65 1","pages":"1"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88899454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
How Designers Use Design Principles: Design Behaviors and Application Modes 设计师如何使用设计原则:设计行为和应用模式
IF 5.8 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.17705/1jais.00759
Leona Chandra Kruse, S. Purao, S. Seidel
This paper investigates how information systems design professionals use design principles (extracted from a prior design science research project) in a new design situation. We do this by capturing think-aloud protocols from experienced design professionals who are given access to potentially useful design principles. Our analysis identifies two dimensions of use: design behaviors (what designers do) and application modes (how designers apply the principles). Mapping across the dimensions suggests two use pathways: forward chaining and backward chaining. Our study shows how empirically studying expert designers can shed light on the microprocesses of design principles in use, and how an empirical turn in the investigation can contribute to clarifying the fundamental nature of design principles. We conclude by highlighting the implications of these insights for crafting more useful design principles.
本文调查了信息系统设计专业人员如何在新的设计情况下使用设计原则(从先前的设计科学研究项目中提取)。我们通过从经验丰富的设计专业人员那里获取“大声思考”协议来实现这一点,这些设计专业人员可以获得潜在有用的设计原则。我们的分析确定了使用的两个维度:设计行为(设计师做什么)和应用模式(设计师如何应用这些原则)。跨维度的映射建议了两种使用途径:前向链接和后向链接。我们的研究表明,通过实证研究专家设计师如何能够揭示设计原则在使用中的微过程,以及调查中的实证转向如何有助于澄清设计原则的基本性质。最后,我们强调了这些见解对于制定更有用的设计原则的含义。
{"title":"How Designers Use Design Principles: Design Behaviors and Application Modes","authors":"Leona Chandra Kruse, S. Purao, S. Seidel","doi":"10.17705/1jais.00759","DOIUrl":"https://doi.org/10.17705/1jais.00759","url":null,"abstract":"This paper investigates how information systems design professionals use design principles (extracted from a prior design science research project) in a new design situation. We do this by capturing think-aloud protocols from experienced design professionals who are given access to potentially useful design principles. Our analysis identifies two dimensions of use: design behaviors (what designers do) and application modes (how designers apply the principles). Mapping across the dimensions suggests two use pathways: forward chaining and backward chaining. Our study shows how empirically studying expert designers can shed light on the microprocesses of design principles in use, and how an empirical turn in the investigation can contribute to clarifying the fundamental nature of design principles. We conclude by highlighting the implications of these insights for crafting more useful design principles.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"4 1","pages":"3"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87808789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
How Do Individuals Understand Multiple Conceptual Modeling Scripts? 个体如何理解多个概念建模脚本?
IF 5.8 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.17705/1jais.00750
M. Jabbari, J. Recker, Peter F. Green, K. Werder
Because most real-world domains intended to be supported by an information system are complex, practitioners often use multiple different types of conceptual modeling scripts to understand them. We performed two experiments to examine how two theoretical factors of multiple scripts— combined ontological completeness and ontological overlap—influence how users develop an understanding of a real-world domain from multiple scripts. Results of the first experiment show that to some degree, ontological overlap improves participants’ understanding of a domain, more so than combined ontological completeness. In the second experiment, we tracked the eye movement data of participants to understand how ontological overlap between scripts impacts users’ information search and cognitive integration processes. We found that some occurrence of semantically similar constructs between scripts helps individuals to identify and relate constructs presented in different scripts. Users, therefore, can identify and focus on script areas that are relevant to their problem tasks. However, a high level of ontological overlap decreases the attention paid by participants to relevant task-specific areas because they spend more time searching for relevant information. Together, our findings both refine and extend existing conceptual modeling theory. We clarify the dialectics between the full and parsimonious real-world representations offered through multiple scripts and the individual’s understanding of the domain that is represented by those scripts.
由于信息系统支持的大多数现实世界领域都是复杂的,从业者通常使用多种不同类型的概念建模脚本来理解它们。我们进行了两个实验来研究多脚本的两个理论因素——结合本体完整性和本体重叠——如何影响用户如何从多个脚本中开发对现实世界领域的理解。第一个实验的结果表明,在某种程度上,本体重叠比组合本体完备性更能提高参与者对领域的理解。在第二项实验中,我们追踪了参与者的眼动数据,以了解文本本体重叠如何影响用户的信息搜索和认知整合过程。我们发现,在不同的文字中出现语义相似的构念有助于个体识别和联系不同的文字中呈现的构念。因此,用户可以识别并关注与他们的问题任务相关的脚本区域。然而,高水平的本体论重叠降低了参与者对相关任务特定领域的关注,因为他们花了更多的时间来搜索相关信息。总之,我们的发现完善和扩展了现有的概念建模理论。我们澄清了通过多脚本提供的完整和简约的现实世界表征与个人对这些脚本所代表的领域的理解之间的辩证法。
{"title":"How Do Individuals Understand Multiple Conceptual Modeling Scripts?","authors":"M. Jabbari, J. Recker, Peter F. Green, K. Werder","doi":"10.17705/1jais.00750","DOIUrl":"https://doi.org/10.17705/1jais.00750","url":null,"abstract":"Because most real-world domains intended to be supported by an information system are complex, practitioners often use multiple different types of conceptual modeling scripts to understand them. We performed two experiments to examine how two theoretical factors of multiple scripts— combined ontological completeness and ontological overlap—influence how users develop an understanding of a real-world domain from multiple scripts. Results of the first experiment show that to some degree, ontological overlap improves participants’ understanding of a domain, more so than combined ontological completeness. In the second experiment, we tracked the eye movement data of participants to understand how ontological overlap between scripts impacts users’ information search and cognitive integration processes. We found that some occurrence of semantically similar constructs between scripts helps individuals to identify and relate constructs presented in different scripts. Users, therefore, can identify and focus on script areas that are relevant to their problem tasks. However, a high level of ontological overlap decreases the attention paid by participants to relevant task-specific areas because they spend more time searching for relevant information. Together, our findings both refine and extend existing conceptual modeling theory. We clarify the dialectics between the full and parsimonious real-world representations offered through multiple scripts and the individual’s understanding of the domain that is represented by those scripts.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":" 12","pages":"1"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72377658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
When Socialization Goes Wrong: Understanding the We-Intention to Participate in Collective Trolling in Virtual Communities 当社会化出了问题:理解我们——参与虚拟社区集体挑衅的意图
IF 5.8 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.17705/1JAIS.00737
Yangjun Li, Christy M. K. Cheung, Xiao-Liang Shen, Matthew K. O. Lee
Although collective trolling poses a growing threat to both individuals and virtual community owners, the information systems (IS) literature lacks a rich theorization of this phenomenon. To address the research gaps, we introduce the concept of we-intention to capture the collective nature of collective trolling in virtual communities. We also integrate the social identity model of deindividuation effects (SIDE) and situational action theory to invoke the sociotechnical perspective in theorizing collective trolling in virtual communities. The objective of this study is to use the sociotechnical perspective to understand the we-intention to participate in collective trolling in virtual communities. We test our proposed model using data gathered from 377 Reddit users. Our moderated mediation analysis elaborates how technical elements (i.e., anonymity of self and anonymity of others) influence the we-intention to participate in collective trolling via individual-based social elements (i.e., perceived online disinhibition and social identity), with an environment-based social element (i.e., the absence of capable guardianship) as a boundary condition. We contribute to research by explaining collective trolling in virtual communities from the group-referent intentional action perspective and sociotechnical perspective. We also offer practical insights into ways to combat collective trolling in virtual communities.
尽管集体网络喷子对个人和虚拟社区所有者构成了越来越大的威胁,但信息系统(IS)文献缺乏对这一现象的丰富理论。为了解决研究空白,我们引入了“我们意图”的概念,以捕捉虚拟社区中集体钓鱼的集体性质。我们还整合了去个性化效应的社会身份模型(SIDE)和情境行动理论,以调用社会技术视角来理论化虚拟社区中的集体钓鱼行为。本研究的目的是利用社会技术的视角来理解我们在虚拟社区中参与集体喷子的意图。我们使用从377名Reddit用户收集的数据来测试我们提出的模型。我们的适度中介分析阐述了技术因素(即自我匿名和他人匿名)如何通过基于个人的社会因素(即感知到的在线解除抑制和社会身份)影响我们参与集体钓鱼的意图,以基于环境的社会因素(即缺乏有能力的监护)作为边界条件。我们通过从群体所指的故意行为角度和社会技术角度解释虚拟社区中的集体钓鱼行为来促进研究。我们还提供了实际的见解,如何打击集体喷子在虚拟社区。
{"title":"When Socialization Goes Wrong: Understanding the We-Intention to Participate in Collective Trolling in Virtual Communities","authors":"Yangjun Li, Christy M. K. Cheung, Xiao-Liang Shen, Matthew K. O. Lee","doi":"10.17705/1JAIS.00737","DOIUrl":"https://doi.org/10.17705/1JAIS.00737","url":null,"abstract":"Although collective trolling poses a growing threat to both individuals and virtual community owners, the information systems (IS) literature lacks a rich theorization of this phenomenon. To address the research gaps, we introduce the concept of we-intention to capture the collective nature of collective trolling in virtual communities. We also integrate the social identity model of deindividuation effects (SIDE) and situational action theory to invoke the sociotechnical perspective in theorizing collective trolling in virtual communities. The objective of this study is to use the sociotechnical perspective to understand the we-intention to participate in collective trolling in virtual communities. We test our proposed model using data gathered from 377 Reddit users. Our moderated mediation analysis elaborates how technical elements (i.e., anonymity of self and anonymity of others) influence the we-intention to participate in collective trolling via individual-based social elements (i.e., perceived online disinhibition and social identity), with an environment-based social element (i.e., the absence of capable guardianship) as a boundary condition. We contribute to research by explaining collective trolling in virtual communities from the group-referent intentional action perspective and sociotechnical perspective. We also offer practical insights into ways to combat collective trolling in virtual communities.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"2072 1","pages":"5"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86550681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Why and How Online Experiments Can Benefit Information Systems Research 在线实验为何以及如何有益于信息系统研究
IF 5.8 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.17705/1jais.00787
L. Fink
Online experiments have become an important methodology in the study of human behavior. While social scientists have been quick to capitalize on the benefits of online experiments, information systems (IS) researchers seem to be among the laggards in taking advantage of this emerging paradigm, despite having the research motivations and technological capabilities to be among the leaders. A major reason for this gap is probably the secondary role traditionally attributed in IS research to experimental methods, as repeatedly demonstrated in methodological reviews of work published in major IS publication outlets. The purpose of this editorial is to encourage IS researchers interested in online behavior to adopt online experiments as a primary methodology, which may substitute for traditional lab experiments and complement nonexperimental methods. This purpose is pursued by analyzing why IS research has lagged behind neighboring disciplines in adopting experimental methods, what IS research can benefit from utilizing online experiments, and how IS research can reap these benefits. The prescriptive analysis is structured around key considerations that should be taken into account in using online experiments to study online behavior.
在线实验已经成为研究人类行为的一种重要方法。虽然社会科学家已经迅速利用在线实验的好处,但信息系统(IS)研究人员似乎在利用这一新兴范式方面处于落后地位,尽管他们有研究动机和技术能力成为领导者。造成这种差距的一个主要原因可能是传统上认为实验方法在is研究中的次要作用,正如在主要is出版物上发表的工作的方法评论中反复证明的那样。这篇社论的目的是鼓励对在线行为感兴趣的is研究人员采用在线实验作为主要方法,可以替代传统的实验室实验并补充非实验方法。为了达到这个目的,我们分析了为什么is研究在采用实验方法方面落后于邻近学科,is研究可以从利用在线实验中获得什么好处,以及is研究如何获得这些好处。规定性分析是围绕使用在线实验研究在线行为时应考虑的关键因素构建的。
{"title":"Why and How Online Experiments Can Benefit Information Systems Research","authors":"L. Fink","doi":"10.17705/1jais.00787","DOIUrl":"https://doi.org/10.17705/1jais.00787","url":null,"abstract":"Online experiments have become an important methodology in the study of human behavior. While social scientists have been quick to capitalize on the benefits of online experiments, information systems (IS) researchers seem to be among the laggards in taking advantage of this emerging paradigm, despite having the research motivations and technological capabilities to be among the leaders. A major reason for this gap is probably the secondary role traditionally attributed in IS research to experimental methods, as repeatedly demonstrated in methodological reviews of work published in major IS publication outlets. The purpose of this editorial is to encourage IS researchers interested in online behavior to adopt online experiments as a primary methodology, which may substitute for traditional lab experiments and complement nonexperimental methods. This purpose is pursued by analyzing why IS research has lagged behind neighboring disciplines in adopting experimental methods, what IS research can benefit from utilizing online experiments, and how IS research can reap these benefits. The prescriptive analysis is structured around key considerations that should be taken into account in using online experiments to study online behavior.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"16 1","pages":"11"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86855258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Adversarial Dance: Toward an Understanding of Insiders' Responses to Organizational Information Security Measures 对抗之舞:了解内部人士对组织资讯安全措施的反应
IF 5.8 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.17705/1jais.00798
P. Balozian, A. Burns, D. Leidner
Despite the increased focus on organizational security policies and programs, some employees continue to engage in maladaptive responses to security measures (i.e., behaviors other than those recommended, intended, or prescribed). To help shed light on insiders’ adaptive and maladaptive responses to IS security measures, we conducted a case study of an organization at the forefront of security policy initiatives. Drawing on the beliefs-actions-outcomes (BAO) model to analyze our case data, we uncover a potentially nonvirtuous cycle consisting of security-related beliefs, actions, and outcomes, which we refer to as an “adversarial dance.” Explaining our results, we describe a novel belief framework that identifies four security belief profiles and uncovers an underexplored outcome of IS security: insiders’ lived security experiences. We find that individuals’ unfavorable lived security experiences produce counterproductive security-related beliefs that, in turn, lead to maladaptive behaviors. Maladaptive behaviors create new potential for security risk, leading to increased organizational security measures to counter them. Thus, the adversarial dance continues, as the new security measures have the potential to reinforce counterproductive security-related beliefs about the importance and risk of IS security and lead to new maladaptive behaviors. To help situate our findings within the current security literature, we integrate the results with prior research based on extant theories. While this paper is not the first to suggest that security measures can elicit maladaptive behaviors, the emergent belief framework and expanded BAO model of IS security constitute an important contribution to the behavioral IS security literature.
尽管对组织安全政策和计划的关注有所增加,但一些员工继续对安全措施(即,与推荐、预期或规定的行为不同的行为)做出不适应的反应。为了帮助阐明内部人员对IS安全措施的适应和不适应反应,我们对处于安全策略倡议前沿的组织进行了案例研究。利用信念-行动-结果(BAO)模型来分析我们的案例数据,我们发现了一个由与安全相关的信念、行动和结果组成的潜在的非良性循环,我们将其称为“对抗之舞”。为了解释我们的结果,我们描述了一个新的信念框架,该框架确定了四种安全信念概况,并揭示了信息系统安全的一个未被探索的结果:内部人员的生活安全体验。我们发现,个人不良的生活安全经历会产生适得其反的安全相关信念,进而导致适应不良行为。适应不良的行为会产生新的安全风险,导致增加组织的安全措施来应对它们。因此,对抗的舞蹈仍在继续,因为新的安全措施有可能加强对IS安全的重要性和风险的适得其反的安全相关信念,并导致新的适应不良行为。为了帮助将我们的发现置于当前的安全文献中,我们将结果与基于现有理论的先前研究相结合。虽然本文并不是第一个提出安全措施会引发不适应行为的研究,但信息系统安全的涌现信念框架和扩展的BAO模型对行为信息系统安全文献做出了重要贡献。
{"title":"An Adversarial Dance: Toward an Understanding of Insiders' Responses to Organizational Information Security Measures","authors":"P. Balozian, A. Burns, D. Leidner","doi":"10.17705/1jais.00798","DOIUrl":"https://doi.org/10.17705/1jais.00798","url":null,"abstract":"Despite the increased focus on organizational security policies and programs, some employees continue to engage in maladaptive responses to security measures (i.e., behaviors other than those recommended, intended, or prescribed). To help shed light on insiders’ adaptive and maladaptive responses to IS security measures, we conducted a case study of an organization at the forefront of security policy initiatives. Drawing on the beliefs-actions-outcomes (BAO) model to analyze our case data, we uncover a potentially nonvirtuous cycle consisting of security-related beliefs, actions, and outcomes, which we refer to as an “adversarial dance.” Explaining our results, we describe a novel belief framework that identifies four security belief profiles and uncovers an underexplored outcome of IS security: insiders’ lived security experiences. We find that individuals’ unfavorable lived security experiences produce counterproductive security-related beliefs that, in turn, lead to maladaptive behaviors. Maladaptive behaviors create new potential for security risk, leading to increased organizational security measures to counter them. Thus, the adversarial dance continues, as the new security measures have the potential to reinforce counterproductive security-related beliefs about the importance and risk of IS security and lead to new maladaptive behaviors. To help situate our findings within the current security literature, we integrate the results with prior research based on extant theories. While this paper is not the first to suggest that security measures can elicit maladaptive behaviors, the emergent belief framework and expanded BAO model of IS security constitute an important contribution to the behavioral IS security literature.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"108 1","pages":"4"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90104341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Penetration or Skimming? Pricing Strategies for Software Platforms Considering Asymmetric Cross-Side Network Effects 渗透还是略读?考虑非对称横向网络效应的软件平台定价策略
IF 5.8 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.17705/1jais.00748
Nan Yuan, Haiyang Feng, Minqiang Li, Nan Feng
Considering a two-sided software platform with software developers on one side and software users on the other, we study whether the platform should adopt a penetration pricing strategy or skimming pricing strategy on the developer side. We propose a two-period analytical model with asymmetric cross-side network effects to analyze the platform’s optimal pricing strategy. Our analysis reveals that the platform should adopt a penetration pricing strategy if the user-to-developer network effect is strong and a skimming pricing strategy otherwise. If the platform does not charge users an access fee, the platform should consider subsidizing developers’ access in the first period only. However, when the platform charges users an access fee, subsidizing developers’ access in both periods can be viable for the platform. Charging the software user an access fee incentivizes the platform to subsidize developers in the first period if the user-to-developer network effect is weak. Finally, this study reveals that the optimal access fee charged or subsidy provided to developers in the two periods is determined by several key factors: developers’ basic expectations about the revenue to be gained from the platform (optimistic or pessimistic), intensities of cross-side network effects, the lengths of the two periods, and the access fee charged to users.
考虑一个以软件开发者为一方,软件用户为另一方的双边软件平台,我们研究了该平台应该采用渗透定价策略还是开发者端撇脂定价策略。我们提出了一个考虑不对称横向网络效应的两周期分析模型来分析平台的最优定价策略。我们的分析表明,如果用户与开发者之间的网络效应强大,平台应该采用渗透定价策略,否则则采用撇脂定价策略。如果平台不向用户收取访问费用,则平台应考虑仅在第一阶段补贴开发者的访问费用。然而,当平台向用户收取访问费用时,补贴开发者在这两个时期的访问对平台来说是可行的。如果用户对开发者的网络效应较弱,向软件用户收取使用费会激励平台在第一阶段补贴开发者。最后,本研究揭示了两个周期内向开发者收取或补贴的最优接入费用由几个关键因素决定:开发者对平台收益的基本预期(乐观或悲观)、横向网络效应的强度、两个周期的长度以及向用户收取的接入费用。
{"title":"Penetration or Skimming? Pricing Strategies for Software Platforms Considering Asymmetric Cross-Side Network Effects","authors":"Nan Yuan, Haiyang Feng, Minqiang Li, Nan Feng","doi":"10.17705/1jais.00748","DOIUrl":"https://doi.org/10.17705/1jais.00748","url":null,"abstract":"Considering a two-sided software platform with software developers on one side and software users on the other, we study whether the platform should adopt a penetration pricing strategy or skimming pricing strategy on the developer side. We propose a two-period analytical model with asymmetric cross-side network effects to analyze the platform’s optimal pricing strategy. Our analysis reveals that the platform should adopt a penetration pricing strategy if the user-to-developer network effect is strong and a skimming pricing strategy otherwise. If the platform does not charge users an access fee, the platform should consider subsidizing developers’ access in the first period only. However, when the platform charges users an access fee, subsidizing developers’ access in both periods can be viable for the platform. Charging the software user an access fee incentivizes the platform to subsidize developers in the first period if the user-to-developer network effect is weak. Finally, this study reveals that the optimal access fee charged or subsidy provided to developers in the two periods is determined by several key factors: developers’ basic expectations about the revenue to be gained from the platform (optimistic or pessimistic), intensities of cross-side network effects, the lengths of the two periods, and the access fee charged to users.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"15 1","pages":"3"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79957254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sustainable Energy Transition: Intermittency Policy Based on Digital Mirror Actions 可持续能源转型:基于数字镜像动作的间歇性政策
IF 5.8 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.17705/1jais.00752
R. Watson, W. Ketter, J. Recker, S. Seidel
The transition to renewable energy requires organizations and governments to formulate and enact new energy policies. This emerging energy era is characterized by higher levels of supply and demand intermittency, which requires information systems to manage the electricity grid. We propose key policy elements for managing intermittency based on information systems to implement digital mirror actions for managing the production, consumption, and transfer of electricity and market mechanisms for maintaining grid equilibrium. This article discusses these and their energy policy implications.
向可再生能源的过渡需要组织和政府制定和颁布新的能源政策。这个新兴的能源时代的特点是更高水平的供需间歇性,这需要信息系统来管理电网。我们提出了基于信息系统管理间歇性的关键政策要素,以实施数字镜像行动来管理电力的生产、消费和转移,以及维持电网平衡的市场机制。本文将讨论这些问题及其对能源政策的影响。
{"title":"Sustainable Energy Transition: Intermittency Policy Based on Digital Mirror Actions","authors":"R. Watson, W. Ketter, J. Recker, S. Seidel","doi":"10.17705/1jais.00752","DOIUrl":"https://doi.org/10.17705/1jais.00752","url":null,"abstract":"The transition to renewable energy requires organizations and governments to formulate and enact new energy policies. This emerging energy era is characterized by higher levels of supply and demand intermittency, which requires information systems to manage the electricity grid. We propose key policy elements for managing intermittency based on information systems to implement digital mirror actions for managing the production, consumption, and transfer of electricity and market mechanisms for maintaining grid equilibrium. This article discusses these and their energy policy implications.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"32 1","pages":"7"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79350757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Journal of the Association for Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1