Blue-collar remote and mobile workers (BC-RMWs) such as repair/installation engineers, delivery drivers, and construction workers, constitute a significant share of the workforce. They work away from a home or office work base at customer and remote work sites and are highly dependent on ICT for completing their work tasks. Low occupational well-being is a key concern regarding BC-RMWs. The objective of this research is to understand how BC-RMWs can use information and communication technology (ICT) to elevate their occupational well-being. Drawing from the job demands-job resources theoretical framework in occupational psychology, we theorize that the distinctive work characteristics faced by BC-RMWs can be viewed in the conceptual framing of job demands. We conceptualize BC-RMWs’ practices of ICT use as possible ways to gather resources to tackle these demands. We conducted a study of 28 BC-RMWs employed in two private sector firms (telecom service provision and construction industries) in the UK across 14 remote work sites. Based on our findings, we developed the concept of ICT-enabled job crafting and theorized how ICT-enabled job crafting by BC-RMWs can help them increase their job resources to tackle their job demands and consequently increase their occupational well-being. The empirical context of the paper, i.e., the study of BC-RMWs, provides further novelty because these kinds of workers and their distinctive and interesting work conditions have not received much attention in the literature.
{"title":"Remote, Mobile, and Blue-Collar: ICT-Enabled Job Crafting to Elevate Occupational Well-Being","authors":"Monideepa Tarafdar, Carol Saunders","doi":"10.17705/1jais.00738","DOIUrl":"https://doi.org/10.17705/1jais.00738","url":null,"abstract":"Blue-collar remote and mobile workers (BC-RMWs) such as repair/installation engineers, delivery drivers, and construction workers, constitute a significant share of the workforce. They work away from a home or office work base at customer and remote work sites and are highly dependent on ICT for completing their work tasks. Low occupational well-being is a key concern regarding BC-RMWs. The objective of this research is to understand how BC-RMWs can use information and communication technology (ICT) to elevate their occupational well-being. Drawing from the job demands-job resources theoretical framework in occupational psychology, we theorize that the distinctive work characteristics faced by BC-RMWs can be viewed in the conceptual framing of job demands. We conceptualize BC-RMWs’ practices of ICT use as possible ways to gather resources to tackle these demands. We conducted a study of 28 BC-RMWs employed in two private sector firms (telecom service provision and construction industries) in the UK across 14 remote work sites. Based on our findings, we developed the concept of ICT-enabled job crafting and theorized how ICT-enabled job crafting by BC-RMWs can help them increase their job resources to tackle their job demands and consequently increase their occupational well-being. The empirical context of the paper, i.e., the study of BC-RMWs, provides further novelty because these kinds of workers and their distinctive and interesting work conditions have not received much attention in the literature.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"2015 1","pages":"4"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87253057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Research has shown that many people use social networking sites (SNS) excessively, which may lead to various negative consequences. With the aim of reducing SNS addition, this study investigates the role of SNS characteristics in the formation of SNS addiction. By applying incentive sensitization theory in the context of SNS addiction, we suggest that the compulsive motivation for using an SNS is developed by pleasurable and rewarding SNS use experiences. Social network characteristics and communication characteristics, which determine the rewards that users obtain from SNS use, moderate the relationship between habitual SNS use and SNS addiction. We develop novel behavioral measures of habitual SNS use and SNS addiction based on SNS activity logs and empirically test the research model using a large and unique dataset. Besides contributing to the theoretical development of SNS addiction, the results of this study offer practical options to help prevent SNS addiction. Moreover, the measures of SNS addiction enable the automated monitoring of user behavior on SNS, which could be useful for detecting potential SNS addicts.
{"title":"Why Are People Addicted to SNS? Understanding the Role of SNS Characteristics in the Formation of SNS Addiction","authors":"Haifeng Xu, T. Phan, B. Tan","doi":"10.17705/1JAIS.00735","DOIUrl":"https://doi.org/10.17705/1JAIS.00735","url":null,"abstract":"Research has shown that many people use social networking sites (SNS) excessively, which may lead to various negative consequences. With the aim of reducing SNS addition, this study investigates the role of SNS characteristics in the formation of SNS addiction. By applying incentive sensitization theory in the context of SNS addiction, we suggest that the compulsive motivation for using an SNS is developed by pleasurable and rewarding SNS use experiences. Social network characteristics and communication characteristics, which determine the rewards that users obtain from SNS use, moderate the relationship between habitual SNS use and SNS addiction. We develop novel behavioral measures of habitual SNS use and SNS addiction based on SNS activity logs and empirically test the research model using a large and unique dataset. Besides contributing to the theoretical development of SNS addiction, the results of this study offer practical options to help prevent SNS addiction. Moreover, the measures of SNS addiction enable the automated monitoring of user behavior on SNS, which could be useful for detecting potential SNS addicts.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"65 1","pages":"1"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88899454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Scholarly writing is a difficult skill to develop. This editorial presents our observations on how to move from acceptable to exceptional writing in academic manuscripts. We discuss three phases of writing—the predrafting, drafting, and postdrafting phases—and provide suggestions based on our experiences for improving the quality of academic manuscripts prior to their submission.
{"title":"On Scholarly Composition: From Acceptable to Exceptional","authors":"D. Leidner, Monica Birth","doi":"10.17705/1jais.00799","DOIUrl":"https://doi.org/10.17705/1jais.00799","url":null,"abstract":"Scholarly writing is a difficult skill to develop. This editorial presents our observations on how to move from acceptable to exceptional writing in academic manuscripts. We discuss three phases of writing—the predrafting, drafting, and postdrafting phases—and provide suggestions based on our experiences for improving the quality of academic manuscripts prior to their submission.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"6 1","pages":"10"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74825729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper investigates how information systems design professionals use design principles (extracted from a prior design science research project) in a new design situation. We do this by capturing think-aloud protocols from experienced design professionals who are given access to potentially useful design principles. Our analysis identifies two dimensions of use: design behaviors (what designers do) and application modes (how designers apply the principles). Mapping across the dimensions suggests two use pathways: forward chaining and backward chaining. Our study shows how empirically studying expert designers can shed light on the microprocesses of design principles in use, and how an empirical turn in the investigation can contribute to clarifying the fundamental nature of design principles. We conclude by highlighting the implications of these insights for crafting more useful design principles.
{"title":"How Designers Use Design Principles: Design Behaviors and Application Modes","authors":"Leona Chandra Kruse, S. Purao, S. Seidel","doi":"10.17705/1jais.00759","DOIUrl":"https://doi.org/10.17705/1jais.00759","url":null,"abstract":"This paper investigates how information systems design professionals use design principles (extracted from a prior design science research project) in a new design situation. We do this by capturing think-aloud protocols from experienced design professionals who are given access to potentially useful design principles. Our analysis identifies two dimensions of use: design behaviors (what designers do) and application modes (how designers apply the principles). Mapping across the dimensions suggests two use pathways: forward chaining and backward chaining. Our study shows how empirically studying expert designers can shed light on the microprocesses of design principles in use, and how an empirical turn in the investigation can contribute to clarifying the fundamental nature of design principles. We conclude by highlighting the implications of these insights for crafting more useful design principles.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"4 1","pages":"3"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87808789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Because most real-world domains intended to be supported by an information system are complex, practitioners often use multiple different types of conceptual modeling scripts to understand them. We performed two experiments to examine how two theoretical factors of multiple scripts— combined ontological completeness and ontological overlap—influence how users develop an understanding of a real-world domain from multiple scripts. Results of the first experiment show that to some degree, ontological overlap improves participants’ understanding of a domain, more so than combined ontological completeness. In the second experiment, we tracked the eye movement data of participants to understand how ontological overlap between scripts impacts users’ information search and cognitive integration processes. We found that some occurrence of semantically similar constructs between scripts helps individuals to identify and relate constructs presented in different scripts. Users, therefore, can identify and focus on script areas that are relevant to their problem tasks. However, a high level of ontological overlap decreases the attention paid by participants to relevant task-specific areas because they spend more time searching for relevant information. Together, our findings both refine and extend existing conceptual modeling theory. We clarify the dialectics between the full and parsimonious real-world representations offered through multiple scripts and the individual’s understanding of the domain that is represented by those scripts.
{"title":"How Do Individuals Understand Multiple Conceptual Modeling Scripts?","authors":"M. Jabbari, J. Recker, Peter F. Green, K. Werder","doi":"10.17705/1jais.00750","DOIUrl":"https://doi.org/10.17705/1jais.00750","url":null,"abstract":"Because most real-world domains intended to be supported by an information system are complex, practitioners often use multiple different types of conceptual modeling scripts to understand them. We performed two experiments to examine how two theoretical factors of multiple scripts— combined ontological completeness and ontological overlap—influence how users develop an understanding of a real-world domain from multiple scripts. Results of the first experiment show that to some degree, ontological overlap improves participants’ understanding of a domain, more so than combined ontological completeness. In the second experiment, we tracked the eye movement data of participants to understand how ontological overlap between scripts impacts users’ information search and cognitive integration processes. We found that some occurrence of semantically similar constructs between scripts helps individuals to identify and relate constructs presented in different scripts. Users, therefore, can identify and focus on script areas that are relevant to their problem tasks. However, a high level of ontological overlap decreases the attention paid by participants to relevant task-specific areas because they spend more time searching for relevant information. Together, our findings both refine and extend existing conceptual modeling theory. We clarify the dialectics between the full and parsimonious real-world representations offered through multiple scripts and the individual’s understanding of the domain that is represented by those scripts.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":" 12","pages":"1"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72377658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The technology lifecycle model is extensively used to study technology evolution and innovation. However, this model was developed for industrial-age material technologies and does not address digital technologies with nonmaterial elements. Therefore, a question emerges as to whether the level of technological materiality is implicated in different dynamics of innovation, as reflected in the technology lifecycle. Digital technologies evolve through discourse that involves interactions among multiple stakeholders that shape the evolutionary trajectory of the technology. Therefore, we set out to examine whether discourse about digital technologies that vary in their level of materiality manifests in different ways throughout these technologies’ lifecycles. To do so, we conducted a study comparing the discourse around 10 digital technologies—five highly material and five highly nonmaterial—at different stages of their technology lifecycles. We identified three characteristics of discourse—volume, volatility, and diversity—and examined them for the 10 digital technologies by analyzing their corresponding Wikipedia articles. Our findings show that the discourse around technologies with different levels of materiality is similar in the initial era of the lifecycle but diverges in the two subsequent eras. In addition, we found that the discourse around highly nonmaterial technologies remains elevated for longer time periods, compared to highly material technologies. Based on these results, we put forth propositions that challenge and extend existing research on the relationships between the technological level of materiality, discourse, and trajectories of technology evolution.
{"title":"Technology Lifecycles and Digital Technologies: Patterns of Discourse across Levels of Materiality","authors":"Uri Gal, N. Berente, Friedrich Chasin","doi":"10.17705/1jais.00761","DOIUrl":"https://doi.org/10.17705/1jais.00761","url":null,"abstract":"The technology lifecycle model is extensively used to study technology evolution and innovation. However, this model was developed for industrial-age material technologies and does not address digital technologies with nonmaterial elements. Therefore, a question emerges as to whether the level of technological materiality is implicated in different dynamics of innovation, as reflected in the technology lifecycle. Digital technologies evolve through discourse that involves interactions among multiple stakeholders that shape the evolutionary trajectory of the technology. Therefore, we set out to examine whether discourse about digital technologies that vary in their level of materiality manifests in different ways throughout these technologies’ lifecycles. To do so, we conducted a study comparing the discourse around 10 digital technologies—five highly material and five highly nonmaterial—at different stages of their technology lifecycles. We identified three characteristics of discourse—volume, volatility, and diversity—and examined them for the 10 digital technologies by analyzing their corresponding Wikipedia articles. Our findings show that the discourse around technologies with different levels of materiality is similar in the initial era of the lifecycle but diverges in the two subsequent eras. In addition, we found that the discourse around highly nonmaterial technologies remains elevated for longer time periods, compared to highly material technologies. Based on these results, we put forth propositions that challenge and extend existing research on the relationships between the technological level of materiality, discourse, and trajectories of technology evolution.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"37 1","pages":"7"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81666016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yangjun Li, Christy M. K. Cheung, Xiao-Liang Shen, Matthew K. O. Lee
Although collective trolling poses a growing threat to both individuals and virtual community owners, the information systems (IS) literature lacks a rich theorization of this phenomenon. To address the research gaps, we introduce the concept of we-intention to capture the collective nature of collective trolling in virtual communities. We also integrate the social identity model of deindividuation effects (SIDE) and situational action theory to invoke the sociotechnical perspective in theorizing collective trolling in virtual communities. The objective of this study is to use the sociotechnical perspective to understand the we-intention to participate in collective trolling in virtual communities. We test our proposed model using data gathered from 377 Reddit users. Our moderated mediation analysis elaborates how technical elements (i.e., anonymity of self and anonymity of others) influence the we-intention to participate in collective trolling via individual-based social elements (i.e., perceived online disinhibition and social identity), with an environment-based social element (i.e., the absence of capable guardianship) as a boundary condition. We contribute to research by explaining collective trolling in virtual communities from the group-referent intentional action perspective and sociotechnical perspective. We also offer practical insights into ways to combat collective trolling in virtual communities.
{"title":"When Socialization Goes Wrong: Understanding the We-Intention to Participate in Collective Trolling in Virtual Communities","authors":"Yangjun Li, Christy M. K. Cheung, Xiao-Liang Shen, Matthew K. O. Lee","doi":"10.17705/1JAIS.00737","DOIUrl":"https://doi.org/10.17705/1JAIS.00737","url":null,"abstract":"Although collective trolling poses a growing threat to both individuals and virtual community owners, the information systems (IS) literature lacks a rich theorization of this phenomenon. To address the research gaps, we introduce the concept of we-intention to capture the collective nature of collective trolling in virtual communities. We also integrate the social identity model of deindividuation effects (SIDE) and situational action theory to invoke the sociotechnical perspective in theorizing collective trolling in virtual communities. The objective of this study is to use the sociotechnical perspective to understand the we-intention to participate in collective trolling in virtual communities. We test our proposed model using data gathered from 377 Reddit users. Our moderated mediation analysis elaborates how technical elements (i.e., anonymity of self and anonymity of others) influence the we-intention to participate in collective trolling via individual-based social elements (i.e., perceived online disinhibition and social identity), with an environment-based social element (i.e., the absence of capable guardianship) as a boundary condition. We contribute to research by explaining collective trolling in virtual communities from the group-referent intentional action perspective and sociotechnical perspective. We also offer practical insights into ways to combat collective trolling in virtual communities.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"2072 1","pages":"5"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86550681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sentiment analysis is used to mine text data from many sources, including blogs, support forums, and social media, in order to extract customers’ opinions and attitudes. The results can be used to make important assessments about a customer’s attitude toward a company and if and how a company should respond. However, much research on sentiment analysis uses simple classification, where the polarity of a text that is mined is classified as positive, negative, or neutral. This research creates an ontology of emotion process to support sentiment analysis, with an emphasis on obtaining a more fine-grained assessment of sentiment than polarity. The ontology is grounded in a theory of emotion process and consists of concepts that capture the generation of emotion all the way from the occurrence of an event to the resulting behaviors of the person expressing the sentiment. It includes two lexicons: one for affect and one for appraisal. The ontology is applied to posts obtained from customer support forums of large companies to show its applicability in a multilevel evaluation. Doing so provides an example of a complete ontology assessment effort.
{"title":"An Ontology of Emotion Process to Support Sentiment Analysis","authors":"V. Storey, Eun Hee Park","doi":"10.17705/1jais.00749","DOIUrl":"https://doi.org/10.17705/1jais.00749","url":null,"abstract":"Sentiment analysis is used to mine text data from many sources, including blogs, support forums, and social media, in order to extract customers’ opinions and attitudes. The results can be used to make important assessments about a customer’s attitude toward a company and if and how a company should respond. However, much research on sentiment analysis uses simple classification, where the polarity of a text that is mined is classified as positive, negative, or neutral. This research creates an ontology of emotion process to support sentiment analysis, with an emphasis on obtaining a more fine-grained assessment of sentiment than polarity. The ontology is grounded in a theory of emotion process and consists of concepts that capture the generation of emotion all the way from the occurrence of an event to the resulting behaviors of the person expressing the sentiment. It includes two lexicons: one for affect and one for appraisal. The ontology is applied to posts obtained from customer support forums of large companies to show its applicability in a multilevel evaluation. Doing so provides an example of a complete ontology assessment effort.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"1 1","pages":"2"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84062593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Considering a two-sided software platform with software developers on one side and software users on the other, we study whether the platform should adopt a penetration pricing strategy or skimming pricing strategy on the developer side. We propose a two-period analytical model with asymmetric cross-side network effects to analyze the platform’s optimal pricing strategy. Our analysis reveals that the platform should adopt a penetration pricing strategy if the user-to-developer network effect is strong and a skimming pricing strategy otherwise. If the platform does not charge users an access fee, the platform should consider subsidizing developers’ access in the first period only. However, when the platform charges users an access fee, subsidizing developers’ access in both periods can be viable for the platform. Charging the software user an access fee incentivizes the platform to subsidize developers in the first period if the user-to-developer network effect is weak. Finally, this study reveals that the optimal access fee charged or subsidy provided to developers in the two periods is determined by several key factors: developers’ basic expectations about the revenue to be gained from the platform (optimistic or pessimistic), intensities of cross-side network effects, the lengths of the two periods, and the access fee charged to users.
{"title":"Penetration or Skimming? Pricing Strategies for Software Platforms Considering Asymmetric Cross-Side Network Effects","authors":"Nan Yuan, Haiyang Feng, Minqiang Li, Nan Feng","doi":"10.17705/1jais.00748","DOIUrl":"https://doi.org/10.17705/1jais.00748","url":null,"abstract":"Considering a two-sided software platform with software developers on one side and software users on the other, we study whether the platform should adopt a penetration pricing strategy or skimming pricing strategy on the developer side. We propose a two-period analytical model with asymmetric cross-side network effects to analyze the platform’s optimal pricing strategy. Our analysis reveals that the platform should adopt a penetration pricing strategy if the user-to-developer network effect is strong and a skimming pricing strategy otherwise. If the platform does not charge users an access fee, the platform should consider subsidizing developers’ access in the first period only. However, when the platform charges users an access fee, subsidizing developers’ access in both periods can be viable for the platform. Charging the software user an access fee incentivizes the platform to subsidize developers in the first period if the user-to-developer network effect is weak. Finally, this study reveals that the optimal access fee charged or subsidy provided to developers in the two periods is determined by several key factors: developers’ basic expectations about the revenue to be gained from the platform (optimistic or pessimistic), intensities of cross-side network effects, the lengths of the two periods, and the access fee charged to users.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"15 1","pages":"3"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79957254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The transition to renewable energy requires organizations and governments to formulate and enact new energy policies. This emerging energy era is characterized by higher levels of supply and demand intermittency, which requires information systems to manage the electricity grid. We propose key policy elements for managing intermittency based on information systems to implement digital mirror actions for managing the production, consumption, and transfer of electricity and market mechanisms for maintaining grid equilibrium. This article discusses these and their energy policy implications.
{"title":"Sustainable Energy Transition: Intermittency Policy Based on Digital Mirror Actions","authors":"R. Watson, W. Ketter, J. Recker, S. Seidel","doi":"10.17705/1jais.00752","DOIUrl":"https://doi.org/10.17705/1jais.00752","url":null,"abstract":"The transition to renewable energy requires organizations and governments to formulate and enact new energy policies. This emerging energy era is characterized by higher levels of supply and demand intermittency, which requires information systems to manage the electricity grid. We propose key policy elements for managing intermittency based on information systems to implement digital mirror actions for managing the production, consumption, and transfer of electricity and market mechanisms for maintaining grid equilibrium. This article discusses these and their energy policy implications.","PeriodicalId":51101,"journal":{"name":"Journal of the Association for Information Systems","volume":"32 1","pages":"7"},"PeriodicalIF":5.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79350757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}