伦理 I:作者及其研究

IF 6.5 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Information Systems Journal Pub Date : 2023-10-17 DOI:10.1111/isj.12480
Robert M. Davison, Sutirtha Chatterjee
{"title":"伦理 I:作者及其研究","authors":"Robert M. Davison,&nbsp;Sutirtha Chatterjee","doi":"10.1111/isj.12480","DOIUrl":null,"url":null,"abstract":"<p>The ethical values of researchers and the ethical expectations of academic publishers are a permanent feature of our scholarly debates. Meet-the-editor sessions at conferences often touch on a variety of ethical issues, while premier journals publish both special issues and opinion pieces on ethics-related topics. For instance, in a recent issue of the ISJ, Davison et al. (<span>2022</span>) wrote about some of the ethical issues facing action researchers. Indeed, readers with excellent memories may recall that, 20 years ago, a series of articles were published in the Communications of the AIS that later led to the development of a code of research conduct for the AIS.1</p><p>The current editorial is the first of several planned in which we examine specific aspects of ethics in IS research. Our writing of the editorial was stimulated by our encounters with ethical issues as experienced in our editorial roles at the ISJ and other journals. The focus of this editorial is ‘ethics and the researcher’. We do not intend to rehash the entire oeuvre of the topic, as this is extensive: the AIS e-Library indicates 516 items published in Communications of the AIS alone. Indeed, the AIS Code of Research Conduct is quite comprehensive in its coverage. Instead, we explore a few less well-appreciated areas of ethics that we suggest researchers should be aware of. These issues include obtaining human ethics research approval prior to empirical data collection, claiming research outcomes as a panacea, and being transparent in research reporting.</p><p>It is widely accepted that human research ethics approval should be obtained before data is collected from living people. Usually, such approvals are handled at the institutional level, though it is fair to point out that not all institutions require such approvals. Authors cannot be faulted for failing to secure human research ethics approval if their institution does not require it and if local legislation does not protect the privacy of human subjects. However, in these circumstances authors are required to provide details documenting their ethical conduct while collecting data from human subjects. For instance, they should provide details about whether they were transparent in disclosing research goals and risks with participants, along with explaining how they ensured anonymity, when applicable.</p><p>In addition, there may be misunderstandings about the types of data that are subject to these approvals. For instance, should publicly accessible data be subject to such reviews, where the data subjects cannot be reasonably contacted so as to obtain their consent to have that data included in the research? A key issue is whether the data can lead to positive identification (or reidentification) of an individual, and if identification was achieved, what harm or consequence might befall the individual? Research on online communities or relying on crowdsourced data, for example, those gathered from Amazon Mechanical Turk (MTurk), are also problematic. Even if such crowdsourced data subjects cannot be identified, we can ask if they are fairly remunerated for their time.</p><p>In many studies, notably case studies and action research but also surveys that are conducted inside an organisation, human research ethics approval is often obtained from a senior manager on behalf of subordinates. This is not necessarily ideal, and indeed the subordinates may essentially be compelled to participate. Thus, a response rate of close to 100% should flag reviewers' attention. Action research studies are particularly complex, since the organisation is itself a client that expects to benefit from the research. It might be that employees' informed consent is achieved, that is, they are informed that their data will be collected, but the more stringent standard of affirmative consent, where each employee freely and positively affirms a personal willingness to participate in the research, is often never sought, let alone achieved. Regardless of whether we talk about small or big data, if data is generated by human subjects, researchers need to ask themselves whether manipulating that data and publishing inferences derived from the data can hurt people.</p><p>Academic journals are starting to pay attention to these issues, recognising that research ethics approvals may be fabricated (or not obtained at all). Journals are increasingly expecting that authors will be transparent with regard to their protection of the data privacy rights of research subjects irrespective of the jurisdiction that applied to the collection of research data. At a minimum, we expect that reviewers should probe into whether ethical issues were given due attention in research designs and question if there are inconsistencies in the way ethical issues are reported, or indeed if the research practices are clear and ethically defensible.</p><p>A second ethical issue that pertains to authors concerns what we call technological solutionism, that is, research that deterministically offers solutions (to real or imagined problems) without any critical reflection or attempt to test if the solutions actually work in practice. For instance, such ‘solutions’ may benefit a corporate stakeholder yet seriously disadvantage employees. Marginalised and minority groups can also suffer from technologically deterministic solutions. As Díaz Andrade and Techatassanasoontorn (<span>2021</span>) noted, e-banking technology is great for those who like to use it, but when a bank closes rural branches and forces adoption of the technology, those who are digitally challenged or who just do not want to go online to do their banking are left in a difficult situation.</p><p>Researchers need to be mindful of the broader implications and consequences of their research, recognising the limitations of technological narratives that give rise to false hope or that discriminate against some sections of society. It is important that researchers do not overreach while discussing the scholarly and practical implications of their work. Indeed, authors have a duty to inform readers if they feel that there could be negative appropriation/interpretation of their work and whether there could be an ethical issue if that were the case. Making such cautionary notes explicit would be helpful for future researchers and practitioners as they build upon the authors' published study.</p><p>The authors should realise that transparency is of utmost importance in scholarly creativity. Authors should never attempt to ‘hide’ any inconvenient or unwanted facts in an attempt to make a favourable case for publication of the research. In fact, such attempts to hide information would undermine the sanctity of the research project. All steps taken in research design and data analysis should be clearly documented. For example, in a quantitative study it is quite common that authors engage in what is euphemistically called ‘data cleaning’. If authors had a set of items measuring a construct and they dropped a couple due to poor factor loadings, it would be a good idea to document this process in the article with an explanation. Again, if there were certain respondents whose data were discarded, such actions should be documented and justified in the article. If some hypotheses that were originally in the model were not supported, it is preferable not to change the research model just so as to ensure that all hypotheses are supported; instead, discussions about all the originally hypothesised links should be included. Authors should understand that non-significant relationships also support the cause of knowledge advancement and failing to report them can be interpreted as an unethical behaviour. Of course, the reviewers and editors (and readers, if the study is published) will never likely know the ‘original’ model that the authors had in mind. Therefore, the onus is solely on the authors' integrity and their commitment to knowledge advancement in a righteous manner.</p><p>Similar arguments can be made for a qualitative study. In a qualitative study, the authors should be mindful about reporting conclusions that are faithful to the genre of the qualitative research they are conducting. For example, the authors should not attempt to theorise ‘forcefully’ if they are conducting a primarily inductive study (nor should reviewers require them to do so!); instead, their theoretical arguments must be reasonably consistent with (and emerge from) the data that they have obtained. They certainly cannot fabricate interview data in order to plug a hole in their evidence base.</p><p>What is important is to understand that improving clarity of their empirical efforts (in the article) is an ethical duty of the authors. A clear documentation of all empirical steps taken helps the editors and reviewers ascertain the value and rigour of the work, and its possible impact on future research and practice.</p><p>In this issue of the ISJ, we present eight articles and two book reviews.</p><p>In the first article, Wu et al. (<span>2024</span>) investigate the effect of task descriptions on solvers' participation by focusing on informational and affective linguistic signals. They validate a model by analysing 13,929 descriptions posted in single-winner tasks on epwk.com, a Chinese competitive crowdsourcing platform. For informational linguistic signals, the results reveal that there are inverted U-shaped relationships between both concreteness and specificity and solver participation, whereas linguistic accuracy has a positive effect on solver participation. For affective linguistic signals, positive emotional words have a positive relationship with solver participation, whereas negative emotional words have the opposite effect. Theoretical and practical implications are discussed.</p><p>In the second article, Lee et al. (<span>2024</span>) delve into the dynamics of building digital resilience to manage crises. Through an empirical investigation of Taiwan's response to the COVID-19 pandemic, they unpacked four digital orchestration approaches that together constitute an effective strategy for tackling multidimensional and unforeseen crisis-related events and concerns. They also demonstrate how a variety of digital resources can be deployed and utilised. Their conceptual model on digital resilience in the making goes beyond the traditional capability-based theorisation of digital resilience and instead moves toward a process-oriented approach in addressing multiple tensions and challenges arising from crisis conditions.</p><p>In the third article, Karanasios et al. (<span>2024</span>) explore the consequences of using social media in various ways in the context of emergencies in multiple organisations under differing logics. This situation is particularly critical in fields like emergency management where fragmented and inconsistent information is problematic. They undertook a comprehensive qualitative study with 27 organisations including emergency, government, non-government, private, and community entities. The findings enhance understanding of the coevolution of logics and digital technology enactment within an organisational field. The authors present a theoretical model that highlights mutual influence between organisational logics and social media usage. They present a framework capturing the breadth of information flow across an organisational field. These contributions advance theoretical insight into institutional dynamics and improve our understanding of the role of social media in organisational fields. The authors also discuss the practical implications of their findings.</p><p>In the fourth article, Srivastava et al. (<span>2024</span>) theorise the mechanisms through which organisational citizenship behaviour (OCB) fosters positive work attitudes among IT professionals. The authors ground their research in self-perception and self-determination theories, hypothesizing the relationships between IT professionals' OCB and their affective attitudes toward their organisation and job, as being mediated by their cognitive evaluations of the ‘meaning of their IT work’. They test the model with data collected through a large-scale two-wave survey design from a multinational IT-services company. The results offer a nuanced understanding of the relationship between OCB and positive work attitudes for IT professionals, which have significant implications for research and practice.</p><p>In the fifth article, Recker et al. (<span>2024</span>) examine the context of responsible production and consumption, reporting on Vytal, an innovative “scale up” (a rapidly growing young firm) that has managed to become the world's largest provider of digitalized reusable packaging solutions in the food retail sector. The unique challenge of Vytal was to grow their business both in the online world through a digital platform app that must attract both consumers and food providers such as canteens or restaurants, and in the physical food retail world where food containers move around, get dirty, and need cleaning. Vytal navigated this challenge successfully and this article conceptualises the lessons learnt from their growth in a framework that provides recommendations for other firms operating online-to-offline business models.</p><p>In the sixth article, Zhang et al. (<span>2024</span>) remark that online learning platforms provide an opportunity for self-directed learning; however, they often encounter difficulties in maintaining learners' engagement. This study builds upon normative influence theories and explores the impact of peer information on online learning engagement and outcomes, specifically in an online learning setting devoid of external incentives such as rewards or performance evaluations. To investigate this, a field experiment was conducted on an online learning platform. The findings indicate that the mere sharing of information regarding peers' active learning behaviour does not necessarily enhance engagement. However, it does exhibit a positive influence when accompanied by course-related question interventions. This research contributes to our understanding of how peer influence can be utilised to improve engagement and offers practical insights for addressing the challenge of low engagement in online learning settings where learners typically learn in isolation, without external incentives.</p><p>In the seventh article, Liao et al. (<span>2024</span>) examine the social networks present in livestreaming contexts. They propose that both centralised and decentralised networks can coexist within multi-level bimodal platforms via various role-based subgroups with different types of decision-makers. Drawing on social impact theory, they examine the role of information from host-audience centralised and host–host decentralised networks in shaping subscription increment and herding effects. Using a panel dataset, they find that bidirectional ties in host–host networks strengthen both the acquisition of fans and the herding effect in the host-audience decentralised network, with hosts of lower social status gaining more fans than those with higher status in bidirectional ties. This study contributes to the understanding of social network structure, herding effect, social impact theory and livestreaming by problematizing core assumptions and offering a contextual explanation of livestreaming. Moreover, their work provides practitioners with valuable insights into leveraging network effects for hosts' success in livestreaming.</p><p>In the eighth article, Chamakiotis et al. (<span>2024</span>) use a novel methodology involving video diaries and follow-up interviews to explore ‘contemporary boundary work’, that is, the practices individuals develop to manage their boundaries between ‘work’ and ‘life’. Premised on their critique that existing frameworks fail to accurately explain this, they creatively adopt the lenses of ‘hybridity’ (fusion of boundaries) and ‘liminality’ (a state of suspension/in-betweenness) in combination to unpack how the interplay of the two enables or undermines desired boundary work outcomes. Their findings highlight individuals' creative agency in bringing hybridity and liminality together as part of their everyday boundary work. This study offers an important advancement in the field of digital technologies and boundary work, moving away from narrower understandings of contemporary boundary work and providing new conceptual combinations (i.e., the interplay between hybridity and liminality) that could be used to explain additional phenomena in the IS field and beyond.</p><p>Finally, we present two reviews of recently published books: ‘Deep Fakes: Algorithms and Society’ and ‘Digital transformation: Understanding business goals, risks, processes and decisions’.</p>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"34 1","pages":"1-5"},"PeriodicalIF":6.5000,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12480","citationCount":"0","resultStr":"{\"title\":\"Ethics I: Authors and their research\",\"authors\":\"Robert M. Davison,&nbsp;Sutirtha Chatterjee\",\"doi\":\"10.1111/isj.12480\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The ethical values of researchers and the ethical expectations of academic publishers are a permanent feature of our scholarly debates. Meet-the-editor sessions at conferences often touch on a variety of ethical issues, while premier journals publish both special issues and opinion pieces on ethics-related topics. For instance, in a recent issue of the ISJ, Davison et al. (<span>2022</span>) wrote about some of the ethical issues facing action researchers. Indeed, readers with excellent memories may recall that, 20 years ago, a series of articles were published in the Communications of the AIS that later led to the development of a code of research conduct for the AIS.1</p><p>The current editorial is the first of several planned in which we examine specific aspects of ethics in IS research. Our writing of the editorial was stimulated by our encounters with ethical issues as experienced in our editorial roles at the ISJ and other journals. The focus of this editorial is ‘ethics and the researcher’. We do not intend to rehash the entire oeuvre of the topic, as this is extensive: the AIS e-Library indicates 516 items published in Communications of the AIS alone. Indeed, the AIS Code of Research Conduct is quite comprehensive in its coverage. Instead, we explore a few less well-appreciated areas of ethics that we suggest researchers should be aware of. These issues include obtaining human ethics research approval prior to empirical data collection, claiming research outcomes as a panacea, and being transparent in research reporting.</p><p>It is widely accepted that human research ethics approval should be obtained before data is collected from living people. Usually, such approvals are handled at the institutional level, though it is fair to point out that not all institutions require such approvals. Authors cannot be faulted for failing to secure human research ethics approval if their institution does not require it and if local legislation does not protect the privacy of human subjects. However, in these circumstances authors are required to provide details documenting their ethical conduct while collecting data from human subjects. For instance, they should provide details about whether they were transparent in disclosing research goals and risks with participants, along with explaining how they ensured anonymity, when applicable.</p><p>In addition, there may be misunderstandings about the types of data that are subject to these approvals. For instance, should publicly accessible data be subject to such reviews, where the data subjects cannot be reasonably contacted so as to obtain their consent to have that data included in the research? A key issue is whether the data can lead to positive identification (or reidentification) of an individual, and if identification was achieved, what harm or consequence might befall the individual? Research on online communities or relying on crowdsourced data, for example, those gathered from Amazon Mechanical Turk (MTurk), are also problematic. Even if such crowdsourced data subjects cannot be identified, we can ask if they are fairly remunerated for their time.</p><p>In many studies, notably case studies and action research but also surveys that are conducted inside an organisation, human research ethics approval is often obtained from a senior manager on behalf of subordinates. This is not necessarily ideal, and indeed the subordinates may essentially be compelled to participate. Thus, a response rate of close to 100% should flag reviewers' attention. Action research studies are particularly complex, since the organisation is itself a client that expects to benefit from the research. It might be that employees' informed consent is achieved, that is, they are informed that their data will be collected, but the more stringent standard of affirmative consent, where each employee freely and positively affirms a personal willingness to participate in the research, is often never sought, let alone achieved. Regardless of whether we talk about small or big data, if data is generated by human subjects, researchers need to ask themselves whether manipulating that data and publishing inferences derived from the data can hurt people.</p><p>Academic journals are starting to pay attention to these issues, recognising that research ethics approvals may be fabricated (or not obtained at all). Journals are increasingly expecting that authors will be transparent with regard to their protection of the data privacy rights of research subjects irrespective of the jurisdiction that applied to the collection of research data. At a minimum, we expect that reviewers should probe into whether ethical issues were given due attention in research designs and question if there are inconsistencies in the way ethical issues are reported, or indeed if the research practices are clear and ethically defensible.</p><p>A second ethical issue that pertains to authors concerns what we call technological solutionism, that is, research that deterministically offers solutions (to real or imagined problems) without any critical reflection or attempt to test if the solutions actually work in practice. For instance, such ‘solutions’ may benefit a corporate stakeholder yet seriously disadvantage employees. Marginalised and minority groups can also suffer from technologically deterministic solutions. As Díaz Andrade and Techatassanasoontorn (<span>2021</span>) noted, e-banking technology is great for those who like to use it, but when a bank closes rural branches and forces adoption of the technology, those who are digitally challenged or who just do not want to go online to do their banking are left in a difficult situation.</p><p>Researchers need to be mindful of the broader implications and consequences of their research, recognising the limitations of technological narratives that give rise to false hope or that discriminate against some sections of society. It is important that researchers do not overreach while discussing the scholarly and practical implications of their work. Indeed, authors have a duty to inform readers if they feel that there could be negative appropriation/interpretation of their work and whether there could be an ethical issue if that were the case. Making such cautionary notes explicit would be helpful for future researchers and practitioners as they build upon the authors' published study.</p><p>The authors should realise that transparency is of utmost importance in scholarly creativity. Authors should never attempt to ‘hide’ any inconvenient or unwanted facts in an attempt to make a favourable case for publication of the research. In fact, such attempts to hide information would undermine the sanctity of the research project. All steps taken in research design and data analysis should be clearly documented. For example, in a quantitative study it is quite common that authors engage in what is euphemistically called ‘data cleaning’. If authors had a set of items measuring a construct and they dropped a couple due to poor factor loadings, it would be a good idea to document this process in the article with an explanation. Again, if there were certain respondents whose data were discarded, such actions should be documented and justified in the article. If some hypotheses that were originally in the model were not supported, it is preferable not to change the research model just so as to ensure that all hypotheses are supported; instead, discussions about all the originally hypothesised links should be included. Authors should understand that non-significant relationships also support the cause of knowledge advancement and failing to report them can be interpreted as an unethical behaviour. Of course, the reviewers and editors (and readers, if the study is published) will never likely know the ‘original’ model that the authors had in mind. Therefore, the onus is solely on the authors' integrity and their commitment to knowledge advancement in a righteous manner.</p><p>Similar arguments can be made for a qualitative study. In a qualitative study, the authors should be mindful about reporting conclusions that are faithful to the genre of the qualitative research they are conducting. For example, the authors should not attempt to theorise ‘forcefully’ if they are conducting a primarily inductive study (nor should reviewers require them to do so!); instead, their theoretical arguments must be reasonably consistent with (and emerge from) the data that they have obtained. They certainly cannot fabricate interview data in order to plug a hole in their evidence base.</p><p>What is important is to understand that improving clarity of their empirical efforts (in the article) is an ethical duty of the authors. A clear documentation of all empirical steps taken helps the editors and reviewers ascertain the value and rigour of the work, and its possible impact on future research and practice.</p><p>In this issue of the ISJ, we present eight articles and two book reviews.</p><p>In the first article, Wu et al. (<span>2024</span>) investigate the effect of task descriptions on solvers' participation by focusing on informational and affective linguistic signals. They validate a model by analysing 13,929 descriptions posted in single-winner tasks on epwk.com, a Chinese competitive crowdsourcing platform. For informational linguistic signals, the results reveal that there are inverted U-shaped relationships between both concreteness and specificity and solver participation, whereas linguistic accuracy has a positive effect on solver participation. For affective linguistic signals, positive emotional words have a positive relationship with solver participation, whereas negative emotional words have the opposite effect. Theoretical and practical implications are discussed.</p><p>In the second article, Lee et al. (<span>2024</span>) delve into the dynamics of building digital resilience to manage crises. Through an empirical investigation of Taiwan's response to the COVID-19 pandemic, they unpacked four digital orchestration approaches that together constitute an effective strategy for tackling multidimensional and unforeseen crisis-related events and concerns. They also demonstrate how a variety of digital resources can be deployed and utilised. Their conceptual model on digital resilience in the making goes beyond the traditional capability-based theorisation of digital resilience and instead moves toward a process-oriented approach in addressing multiple tensions and challenges arising from crisis conditions.</p><p>In the third article, Karanasios et al. (<span>2024</span>) explore the consequences of using social media in various ways in the context of emergencies in multiple organisations under differing logics. This situation is particularly critical in fields like emergency management where fragmented and inconsistent information is problematic. They undertook a comprehensive qualitative study with 27 organisations including emergency, government, non-government, private, and community entities. The findings enhance understanding of the coevolution of logics and digital technology enactment within an organisational field. The authors present a theoretical model that highlights mutual influence between organisational logics and social media usage. They present a framework capturing the breadth of information flow across an organisational field. These contributions advance theoretical insight into institutional dynamics and improve our understanding of the role of social media in organisational fields. The authors also discuss the practical implications of their findings.</p><p>In the fourth article, Srivastava et al. (<span>2024</span>) theorise the mechanisms through which organisational citizenship behaviour (OCB) fosters positive work attitudes among IT professionals. The authors ground their research in self-perception and self-determination theories, hypothesizing the relationships between IT professionals' OCB and their affective attitudes toward their organisation and job, as being mediated by their cognitive evaluations of the ‘meaning of their IT work’. They test the model with data collected through a large-scale two-wave survey design from a multinational IT-services company. The results offer a nuanced understanding of the relationship between OCB and positive work attitudes for IT professionals, which have significant implications for research and practice.</p><p>In the fifth article, Recker et al. (<span>2024</span>) examine the context of responsible production and consumption, reporting on Vytal, an innovative “scale up” (a rapidly growing young firm) that has managed to become the world's largest provider of digitalized reusable packaging solutions in the food retail sector. The unique challenge of Vytal was to grow their business both in the online world through a digital platform app that must attract both consumers and food providers such as canteens or restaurants, and in the physical food retail world where food containers move around, get dirty, and need cleaning. Vytal navigated this challenge successfully and this article conceptualises the lessons learnt from their growth in a framework that provides recommendations for other firms operating online-to-offline business models.</p><p>In the sixth article, Zhang et al. (<span>2024</span>) remark that online learning platforms provide an opportunity for self-directed learning; however, they often encounter difficulties in maintaining learners' engagement. This study builds upon normative influence theories and explores the impact of peer information on online learning engagement and outcomes, specifically in an online learning setting devoid of external incentives such as rewards or performance evaluations. To investigate this, a field experiment was conducted on an online learning platform. The findings indicate that the mere sharing of information regarding peers' active learning behaviour does not necessarily enhance engagement. However, it does exhibit a positive influence when accompanied by course-related question interventions. This research contributes to our understanding of how peer influence can be utilised to improve engagement and offers practical insights for addressing the challenge of low engagement in online learning settings where learners typically learn in isolation, without external incentives.</p><p>In the seventh article, Liao et al. (<span>2024</span>) examine the social networks present in livestreaming contexts. They propose that both centralised and decentralised networks can coexist within multi-level bimodal platforms via various role-based subgroups with different types of decision-makers. Drawing on social impact theory, they examine the role of information from host-audience centralised and host–host decentralised networks in shaping subscription increment and herding effects. Using a panel dataset, they find that bidirectional ties in host–host networks strengthen both the acquisition of fans and the herding effect in the host-audience decentralised network, with hosts of lower social status gaining more fans than those with higher status in bidirectional ties. This study contributes to the understanding of social network structure, herding effect, social impact theory and livestreaming by problematizing core assumptions and offering a contextual explanation of livestreaming. Moreover, their work provides practitioners with valuable insights into leveraging network effects for hosts' success in livestreaming.</p><p>In the eighth article, Chamakiotis et al. (<span>2024</span>) use a novel methodology involving video diaries and follow-up interviews to explore ‘contemporary boundary work’, that is, the practices individuals develop to manage their boundaries between ‘work’ and ‘life’. Premised on their critique that existing frameworks fail to accurately explain this, they creatively adopt the lenses of ‘hybridity’ (fusion of boundaries) and ‘liminality’ (a state of suspension/in-betweenness) in combination to unpack how the interplay of the two enables or undermines desired boundary work outcomes. Their findings highlight individuals' creative agency in bringing hybridity and liminality together as part of their everyday boundary work. This study offers an important advancement in the field of digital technologies and boundary work, moving away from narrower understandings of contemporary boundary work and providing new conceptual combinations (i.e., the interplay between hybridity and liminality) that could be used to explain additional phenomena in the IS field and beyond.</p><p>Finally, we present two reviews of recently published books: ‘Deep Fakes: Algorithms and Society’ and ‘Digital transformation: Understanding business goals, risks, processes and decisions’.</p>\",\"PeriodicalId\":48049,\"journal\":{\"name\":\"Information Systems Journal\",\"volume\":\"34 1\",\"pages\":\"1-5\"},\"PeriodicalIF\":6.5000,\"publicationDate\":\"2023-10-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1111/isj.12480\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Systems Journal\",\"FirstCategoryId\":\"91\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1111/isj.12480\",\"RegionNum\":2,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"INFORMATION SCIENCE & LIBRARY SCIENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Systems Journal","FirstCategoryId":"91","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1111/isj.12480","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 0

摘要

研究人员的道德价值观和学术出版商的道德期望是我们学术辩论的永恒特征。会议上的编辑见面会经常涉及各种各样的伦理问题,而一流的期刊也会发表与伦理相关的专题和评论文章。例如,在最近一期的ISJ中,戴维森等人(2022)写了一些行动研究人员面临的伦理问题。事实上,记性好的读者可能还记得,20年前,《AIS通讯》上发表了一系列文章,这些文章后来导致了AIS研究行为准则的发展。1当前的社论是我们计划中的几篇社论中的第一篇,我们将研究is研究中的特定伦理方面。我们撰写这篇社论的灵感来自于我们在ISJ和其他期刊担任编辑时遇到的伦理问题。这篇社论的重点是“伦理与研究者”。我们不打算重述该主题的全部作品,因为这是广泛的:AIS电子库显示仅在AIS通讯中发表的516个项目。事实上,《科研行为准则》的内容相当全面。相反,我们探索了一些不太受欢迎的伦理领域,我们建议研究人员应该意识到这一点。这些问题包括在收集经验数据之前获得人类伦理研究批准,声称研究结果是灵丹妙药,以及在研究报告中保持透明。人们普遍认为,在从活人身上收集数据之前,应该获得人类研究伦理的批准。通常,这类审批是在机构层面进行的,不过公平地说,并非所有机构都需要这样的审批。如果他们的机构不要求获得人类研究伦理批准,如果当地立法不保护人类受试者的隐私,那么作者不能因为未能获得批准而受到指责。然而,在这些情况下,作者需要提供详细的记录他们在收集人类受试者数据时的道德行为。例如,他们应该提供细节,说明他们在向参与者披露研究目标和风险方面是否透明,同时解释他们如何在适用的情况下确保匿名。此外,可能存在对受这些批准约束的数据类型的误解。例如,在未能合理联系资料当事人以取得他们同意将该等资料纳入研究的情况下,公众可查阅的资料应否须接受该等审查?关键问题是数据是否可以导致对个人的正面识别(或重新识别),如果实现了识别,个人可能会受到什么伤害或后果?对在线社区的研究或依赖众包数据(例如,从亚马逊土耳其机器人(MTurk)收集的数据)也存在问题。即使这些众包数据主体无法被识别,我们也可以询问他们的时间是否得到了公平的报酬。在许多研究中,尤其是案例研究和行动研究,以及在组织内部进行的调查,人类研究伦理的批准通常是由一名高级经理代表下属获得的。这并不一定是理想的,事实上,下属可能在本质上是被迫参与的。因此,接近100%的回复率应该会引起审稿人的注意。行动研究尤其复杂,因为该组织本身就是希望从研究中受益的客户。可能是员工的知情同意得到了实现,也就是说,他们被告知他们的数据将被收集,但更严格的肯定同意标准,即每个员工自由和积极地肯定个人愿意参与研究,往往从未寻求过,更不用说实现了。不管我们谈论的是小数据还是大数据,如果数据是由人类受试者产生的,研究人员需要问自己,操纵这些数据并发表从数据中得出的推论是否会伤害到人们。学术期刊开始关注这些问题,认识到研究伦理批准可能是捏造的(或根本没有获得批准)。期刊越来越期望作者在保护研究对象的数据隐私权方面保持透明,无论研究数据的收集适用于哪个司法管辖区。至少,我们期望审稿人应该调查在研究设计中是否对伦理问题给予了应有的关注,并质疑伦理问题报告的方式是否存在不一致,或者研究实践是否明确且在伦理上可辩护。 研究人员的道德价值观和学术出版商的道德期望是我们学术辩论的永恒特征。会议上的编辑见面会经常涉及各种各样的伦理问题,而一流的期刊也会发表与伦理相关的专题和评论文章。例如,在最近一期的ISJ中,戴维森等人(2022)写了一些行动研究人员面临的伦理问题。事实上,记性好的读者可能还记得,20年前,《AIS通讯》上发表了一系列文章,这些文章后来导致了AIS研究行为准则的发展。目前的这篇社论是我们计划中的几篇社论中的第一篇,其中我们将研究is研究中的特定伦理方面。我们撰写这篇社论的灵感来自于我们在ISJ和其他期刊担任编辑时遇到的伦理问题。这篇社论的重点是“伦理与研究者”。我们不打算重述该主题的全部作品,因为这是广泛的:AIS电子库显示仅在AIS通讯中发表的516个项目。事实上,《科研行为准则》的内容相当全面。相反,我们探索了一些不太受欢迎的伦理领域,我们建议研究人员应该意识到这一点。这些问题包括在收集经验数据之前获得人类伦理研究批准,声称研究结果是灵丹妙药,以及在研究报告中保持透明。人们普遍认为,在从活人身上收集数据之前,应该获得人类研究伦理的批准。通常,这类审批是在机构层面进行的,不过公平地说,并非所有机构都需要这样的审批。如果他们的机构不要求获得人类研究伦理批准,如果当地立法不保护人类受试者的隐私,那么作者不能因为未能获得批准而受到指责。然而,在这些情况下,作者需要提供详细的记录他们在收集人类受试者数据时的道德行为。例如,他们应该提供细节,说明他们在向参与者披露研究目标和风险方面是否透明,同时解释他们如何在适用的情况下确保匿名。此外,可能存在对受这些批准约束的数据类型的误解。例如,在未能合理联系资料当事人以取得他们同意将该等资料纳入研究的情况下,公众可查阅的资料应否须接受该等审查?关键问题是数据是否可以导致对个人的正面识别(或重新识别),如果实现了识别,个人可能会受到什么伤害或后果?对在线社区的研究或依赖众包数据(例如,从亚马逊土耳其机器人(MTurk)收集的数据)也存在问题。即使这些众包数据主体无法被识别,我们也可以询问他们的时间是否得到了公平的报酬。在许多研究中,尤其是案例研究和行动研究,以及在组织内部进行的调查,人类研究伦理的批准通常是由一名高级经理代表下属获得的。这并不一定是理想的,事实上,下属可能在本质上是被迫参与的。因此,接近100%的回复率应该会引起审稿人的注意。行动研究尤其复杂,因为该组织本身就是希望从研究中受益的客户。可能是员工的知情同意得到了实现,也就是说,他们被告知他们的数据将被收集,但更严格的肯定同意标准,即每个员工自由和积极地肯定个人愿意参与研究,往往从未寻求过,更不用说实现了。不管我们谈论的是小数据还是大数据,如果数据是由人类受试者产生的,研究人员需要问自己,操纵这些数据并发表从数据中得出的推论是否会伤害到人们。学术期刊开始关注这些问题,认识到研究伦理批准可能是捏造的(或根本没有获得批准)。期刊越来越期望作者在保护研究对象的数据隐私权方面保持透明,无论研究数据的收集适用于哪个司法管辖区。至少,我们期望审稿人应该调查在研究设计中是否对伦理问题给予了应有的关注,并质疑伦理问题报告的方式是否存在不一致,或者研究实践是否明确且在伦理上可辩护。 与作者有关的第二个伦理问题涉及我们所谓的技术解决方案主义,即研究确定地提供解决方案(针对真实或想象的问题),而不进行任何批判性反思或尝试测试解决方案是否在实践中实际起作用。例如,这样的“解决方案”可能对公司利益相关者有利,但对员工严重不利。边缘化和少数群体也可能受到技术确定性解决方案的影响。正如Díaz Andrade和Techatassanasoontorn(2021)所指出的那样,电子银行技术对那些喜欢使用它的人来说是很好的,但是当银行关闭农村分行并强制采用该技术时,那些受到数字挑战或不想上网进行银行业务的人就会陷入困境。研究人员需要注意他们的研究的更广泛的影响和后果,认识到技术叙述的局限性,这些叙述会产生虚假的希望或歧视社会的某些部分。重要的是,研究人员在讨论其工作的学术和实际意义时不要过分。事实上,作者有责任告知读者,如果他们觉得他们的作品可能会有负面的挪用/解释,如果是这样的话,是否会有道德问题。在作者发表的研究的基础上,明确提出这样的警告将有助于未来的研究人员和实践者。作者应该意识到,透明度在学术创新中至关重要。作者不应该试图“隐藏”任何不方便或不需要的事实,试图为发表研究提供有利的理由。事实上,这种隐藏信息的企图会破坏研究项目的神圣性。在研究设计和数据分析中采取的所有步骤都应清楚地记录下来。例如,在定量研究中,作者通常会进行委婉地称为“数据清理”的工作。如果作者有一组测量构造的项目,并且由于装载因素不佳而丢失了一些,那么在文章中记录这个过程并进行解释将是一个好主意。同样,如果有某些受访者的数据被丢弃,这种行为应该在文章中记录和证明。如果原来模型中的一些假设不被支持,最好不要改变研究模型,以确保所有假设都得到支持;相反,应该讨论所有最初假设的联系。作者应该明白,非显著关系也支持知识进步的原因,不报告它们可能被解释为不道德的行为。当然,审稿人和编辑(以及读者,如果研究发表了)可能永远不会知道作者心目中的“原始”模型。因此,责任完全在于作者的诚信和他们以正义的方式对知识进步的承诺。类似的论点也适用于定性研究。在定性研究中,作者应该注意报告的结论忠实于他们正在进行的定性研究的类型。例如,如果作者正在进行一项主要的归纳性研究,他们不应该试图“强行”理论化(审稿人也不应该要求他们这样做!);相反,他们的理论论点必须与他们获得的数据合理地一致(并从数据中得出)。他们当然不能为了填补证据基础上的漏洞而捏造采访数据。重要的是要明白,提高他们(在文章中)实证工作的清晰度是作者的道德责任。所有实验步骤的清晰文档有助于编辑和审稿人确定工作的价值和严谨性,以及它对未来研究和实践的可能影响。在这一期的ISJ中,我们发表了八篇文章和两篇书评。在第一篇文章中,Wu等人(2024)通过关注信息和情感语言信号来研究任务描述对解决者参与的影响。他们通过分析epwk.com(一个中国竞争性众包平台)上的13929个单赢家任务描述来验证一个模型。对于信息性语言信号,具体性和特异性与求解者参与之间存在倒u型关系,而语言准确性对求解者参与有正向影响。对于情感语言信号而言,积极情绪词与解决者参与呈正相关,而消极情绪词与解决者参与呈正相关。讨论了理论和实践意义。在第二篇文章中,Lee等人(2024)深入研究了建立数字弹性以管理危机的动态。 与作者有关的第二个伦理问题涉及我们所谓的技术解决方案主义,即研究确定地提供解决方案(针对真实或想象的问题),而不进行任何批判性反思或尝试测试解决方案是否在实践中实际起作用。例如,这样的“解决方案”可能对公司利益相关者有利,但对员工严重不利。边缘化和少数群体也可能受到技术确定性解决方案的影响。正如Díaz Andrade和Techatassanasoontorn(2021)所指出的那样,电子银行技术对那些喜欢使用它的人来说是很好的,但是当银行关闭农村分行并强制采用该技术时,那些受到数字挑战或不想上网进行银行业务的人就会陷入困境。研究人员需要注意他们的研究的更广泛的影响和后果,认识到技术叙述的局限性,这些叙述会产生虚假的希望或歧视社会的某些部分。重要的是,研究人员在讨论其工作的学术和实际意义时不要过分。事实上,作者有责任告知读者,如果他们觉得他们的作品可能会有负面的挪用/解释,如果是这样的话,是否会有道德问题。在作者发表的研究的基础上,明确提出这样的警告将有助于未来的研究人员和实践者。作者应该意识到,透明度在学术创新中至关重要。作者不应该试图“隐藏”任何不方便或不需要的事实,试图为发表研究提供有利的理由。事实上,这种隐藏信息的企图会破坏研究项目的神圣性。在研究设计和数据分析中采取的所有步骤都应清楚地记录下来。例如,在定量研究中,作者通常会进行委婉地称为“数据清理”的工作。如果作者有一组测量构造的项目,并且由于装载因素不佳而丢失了一些,那么在文章中记录这个过程并进行解释将是一个好主意。同样,如果有某些受访者的数据被丢弃,这种行为应该在文章中记录和证明。如果原来模型中的一些假设不被支持,最好不要改变研究模型,以确保所有假设都得到支持;相反,应该讨论所有最初假设的联系。作者应该明白,非显著关系也支持知识进步的原因,不报告它们可能被解释为不道德的行为。当然,审稿人和编辑(以及读者,如果研究发表了)可能永远不会知道作者心目中的“原始”模型。因此,责任完全在于作者的诚信和他们以正义的方式对知识进步的承诺。类似的论点也适用于定性研究。在定性研究中,作者应该注意报告的结论忠实于他们正在进行的定性研究的类型。例如,如果作者正在进行一项主要的归纳性研究,他们不应该试图“强行”理论化(审稿人也不应该要求他们这样做!);相反,他们的理论论点必须与他们获得的数据合理地一致(并从数据中得出)。他们当然不能为了填补证据基础上的漏洞而捏造采访数据。重要的是要明白,提高他们(在文章中)实证工作的清晰度是作者的道德责任。所有实验步骤的清晰文档有助于编辑和审稿人确定工作的价值和严谨性,以及它对未来研究和实践的可能影响。在这一期的ISJ中,我们发表了八篇文章和两篇书评。在第一篇文章中,Wu等人(2024)通过关注信息和情感语言信号来研究任务描述对解决者参与的影响。他们通过分析epwk.com(一个中国竞争性众包平台)上的13929个单赢家任务描述来验证一个模型。对于信息性语言信号,具体性和特异性与求解者参与之间存在倒u型关系,而语言准确性对求解者参与有正向影响。对于情感语言信号而言,积极情绪词与解决者参与呈正相关,而消极情绪词与解决者参与呈正相关。讨论了理论和实践意义。在第二篇文章中,Lee等人(2024)深入研究了建立数字弹性以管理危机的动态。 通过对台湾应对COVID-19大流行的实证调查,他们揭示了四种数字编排方法,这些方法共同构成了应对多维和不可预见的危机相关事件和问题的有效策略。它们还展示了如何部署和利用各种数字资源。他们正在形成的数字弹性概念模型超越了传统的基于能力的数字弹性理论,而是转向以过程为导向的方法来解决危机条件下产生的多重紧张和挑战。在第三篇文章中,Karanasios等人(2024)探讨了在不同逻辑下多个组织的紧急情况下以各种方式使用社交媒体的后果。这种情况在应急管理等领域尤为严重,因为这些领域存在信息碎片化和不一致的问题。他们与包括应急、政府、非政府、私营和社区实体在内的27个组织进行了全面的定性研究。研究结果增强了对组织领域内逻辑和数字技术制定的共同进化的理解。作者提出了一个理论模型,强调了组织逻辑和社交媒体使用之间的相互影响。它们提供了一个框架,捕捉跨组织领域的信息流的广度。这些贡献推进了对制度动力学的理论洞察,并提高了我们对社交媒体在组织领域中的作用的理解。作者还讨论了他们的发现的实际意义。在第四篇文章中,Srivastava等人(2024)对组织公民行为(OCB)在IT专业人员中培养积极工作态度的机制进行了理论分析。作者将他们的研究建立在自我感知和自我决定理论的基础上,假设IT专业人员的组织公民行为和他们对组织和工作的情感态度之间的关系,是由他们对“IT工作意义”的认知评估所介导的。他们用一家跨国it服务公司的大规模两波调查设计收集的数据来测试这个模型。研究结果对组织公民行为与IT专业人员积极工作态度之间的关系提供了细致入微的理解,这对研究和实践具有重要意义。在第五篇文章中,Recker等人(2024)研究了负责任的生产和消费的背景,报告了Vytal,一家创新的“规模化”(一家快速发展的年轻公司),已成功成为食品零售领域全球最大的数字化可重复使用包装解决方案提供商。Vytal面临的独特挑战是,既要通过数字平台应用程序在网络世界发展业务,既要吸引消费者和食堂或餐馆等食品供应商,又要在食品零售的实体世界发展业务,因为食品容器会移动,会变脏,需要清洗。Vytal成功地应对了这一挑战,本文将从他们的成长中吸取的经验教训概念化,为其他运营线上到线下商业模式的公司提供建议。在第六篇文章中,Zhang等人(2024)认为在线学习平台为自主学习提供了机会;然而,他们经常在保持学习者的参与方面遇到困难。本研究建立在规范影响理论的基础上,探讨同伴信息对在线学习参与和结果的影响,特别是在缺乏奖励或绩效评估等外部激励的在线学习环境中。为了研究这一点,我们在一个在线学习平台上进行了实地实验。研究结果表明,仅仅分享关于同伴积极学习行为的信息并不一定会提高参与度。然而,当伴随着与课程相关的问题干预时,它确实表现出积极的影响。这项研究有助于我们理解如何利用同伴影响来提高参与度,并为解决在线学习环境中学习者通常孤立学习,没有外部激励的低参与度挑战提供了实际见解。在第七篇文章中,Liao等人(2024)研究了直播环境中存在的社交网络。他们提出,集中式和分散式网络都可以通过具有不同类型决策者的各种基于角色的子组在多级双峰平台中共存。利用社会影响理论,他们研究了来自主-受众集中型和主-受众分散型网络的信息在塑造订阅增量和羊群效应中的作用。 通过面板数据集,他们发现主-主网络中的双向联系加强了粉丝的获取和主-观众分散网络中的羊群效应,社会地位较低的主人比双向关系中地位较高的主人获得更多的粉丝。本研究通过对核心假设的质疑和对直播的语境解释,有助于理解社交网络结构、羊群效应、社会影响理论和直播。此外,他们的工作为从业者提供了利用网络效应帮助主持人在直播中取得成功的宝贵见解。在第八篇文章中,Chamakiotis等人(2024)使用了一种涉及视频日记和后续访谈的新方法来探索“当代边界工作”,即个人为管理“工作”和“生活”之间的边界而发展的实践。基于他们对现有框架未能准确解释这一点的批评,他们创造性地采用了“混合性”(边界融合)和“阈限性”(一种暂停/中间状态)的镜头,以揭示两者的相互作用如何实现或破坏期望的边界工作结果。他们的发现突出了个人的创造性能动性,将混合性和阈限性结合在一起,作为他们日常边界工作的一部分。这项研究为数字技术和边界工作领域提供了重要的进步,摆脱了对当代边界工作的狭隘理解,并提供了新的概念组合(即混合性和阈限性之间的相互作用),可用于解释信息系统领域及其他领域的其他现象。最后,我们对最近出版的两本书进行了回顾:《深度造假:算法与社会》和《数字化转型:理解商业目标、风险、流程和决策》。我们感谢为这篇社论提供意见的ISJ SEs和ae: Roberta Bernardi、Johan s . ø bo、Marco Marabelli和Antonio Díaz Andrade。 通过面板数据集,他们发现主-主网络中的双向联系加强了粉丝的获取和主-观众分散网络中的羊群效应,社会地位较低的主人比双向关系中地位较高的主人获得更多的粉丝。本研究通过对核心假设的质疑和对直播的语境解释,有助于理解社交网络结构、羊群效应、社会影响理论和直播。此外,他们的工作为从业者提供了利用网络效应帮助主持人在直播中取得成功的宝贵见解。在第八篇文章中,Chamakiotis等人(2024)使用了一种涉及视频日记和后续访谈的新方法来探索“当代边界工作”,即个人为管理“工作”和“生活”之间的边界而发展的实践。基于他们对现有框架未能准确解释这一点的批评,他们创造性地采用了“混合性”(边界融合)和“阈限性”(一种暂停/中间状态)的镜头,以揭示两者的相互作用如何实现或破坏期望的边界工作结果。他们的发现突出了个人的创造性能动性,将混合性和阈限性结合在一起,作为他们日常边界工作的一部分。这项研究为数字技术和边界工作领域提供了重要的进步,摆脱了对当代边界工作的狭隘理解,并提供了新的概念组合(即混合性和阈限性之间的相互作用),可用于解释信息系统领域及其他领域的其他现象。最后,我们对最近出版的两本书进行了回顾:《深度造假:算法与社会》和《数字化转型:理解商业目标、风险、流程和决策》。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Ethics I: Authors and their research

The ethical values of researchers and the ethical expectations of academic publishers are a permanent feature of our scholarly debates. Meet-the-editor sessions at conferences often touch on a variety of ethical issues, while premier journals publish both special issues and opinion pieces on ethics-related topics. For instance, in a recent issue of the ISJ, Davison et al. (2022) wrote about some of the ethical issues facing action researchers. Indeed, readers with excellent memories may recall that, 20 years ago, a series of articles were published in the Communications of the AIS that later led to the development of a code of research conduct for the AIS.1

The current editorial is the first of several planned in which we examine specific aspects of ethics in IS research. Our writing of the editorial was stimulated by our encounters with ethical issues as experienced in our editorial roles at the ISJ and other journals. The focus of this editorial is ‘ethics and the researcher’. We do not intend to rehash the entire oeuvre of the topic, as this is extensive: the AIS e-Library indicates 516 items published in Communications of the AIS alone. Indeed, the AIS Code of Research Conduct is quite comprehensive in its coverage. Instead, we explore a few less well-appreciated areas of ethics that we suggest researchers should be aware of. These issues include obtaining human ethics research approval prior to empirical data collection, claiming research outcomes as a panacea, and being transparent in research reporting.

It is widely accepted that human research ethics approval should be obtained before data is collected from living people. Usually, such approvals are handled at the institutional level, though it is fair to point out that not all institutions require such approvals. Authors cannot be faulted for failing to secure human research ethics approval if their institution does not require it and if local legislation does not protect the privacy of human subjects. However, in these circumstances authors are required to provide details documenting their ethical conduct while collecting data from human subjects. For instance, they should provide details about whether they were transparent in disclosing research goals and risks with participants, along with explaining how they ensured anonymity, when applicable.

In addition, there may be misunderstandings about the types of data that are subject to these approvals. For instance, should publicly accessible data be subject to such reviews, where the data subjects cannot be reasonably contacted so as to obtain their consent to have that data included in the research? A key issue is whether the data can lead to positive identification (or reidentification) of an individual, and if identification was achieved, what harm or consequence might befall the individual? Research on online communities or relying on crowdsourced data, for example, those gathered from Amazon Mechanical Turk (MTurk), are also problematic. Even if such crowdsourced data subjects cannot be identified, we can ask if they are fairly remunerated for their time.

In many studies, notably case studies and action research but also surveys that are conducted inside an organisation, human research ethics approval is often obtained from a senior manager on behalf of subordinates. This is not necessarily ideal, and indeed the subordinates may essentially be compelled to participate. Thus, a response rate of close to 100% should flag reviewers' attention. Action research studies are particularly complex, since the organisation is itself a client that expects to benefit from the research. It might be that employees' informed consent is achieved, that is, they are informed that their data will be collected, but the more stringent standard of affirmative consent, where each employee freely and positively affirms a personal willingness to participate in the research, is often never sought, let alone achieved. Regardless of whether we talk about small or big data, if data is generated by human subjects, researchers need to ask themselves whether manipulating that data and publishing inferences derived from the data can hurt people.

Academic journals are starting to pay attention to these issues, recognising that research ethics approvals may be fabricated (or not obtained at all). Journals are increasingly expecting that authors will be transparent with regard to their protection of the data privacy rights of research subjects irrespective of the jurisdiction that applied to the collection of research data. At a minimum, we expect that reviewers should probe into whether ethical issues were given due attention in research designs and question if there are inconsistencies in the way ethical issues are reported, or indeed if the research practices are clear and ethically defensible.

A second ethical issue that pertains to authors concerns what we call technological solutionism, that is, research that deterministically offers solutions (to real or imagined problems) without any critical reflection or attempt to test if the solutions actually work in practice. For instance, such ‘solutions’ may benefit a corporate stakeholder yet seriously disadvantage employees. Marginalised and minority groups can also suffer from technologically deterministic solutions. As Díaz Andrade and Techatassanasoontorn (2021) noted, e-banking technology is great for those who like to use it, but when a bank closes rural branches and forces adoption of the technology, those who are digitally challenged or who just do not want to go online to do their banking are left in a difficult situation.

Researchers need to be mindful of the broader implications and consequences of their research, recognising the limitations of technological narratives that give rise to false hope or that discriminate against some sections of society. It is important that researchers do not overreach while discussing the scholarly and practical implications of their work. Indeed, authors have a duty to inform readers if they feel that there could be negative appropriation/interpretation of their work and whether there could be an ethical issue if that were the case. Making such cautionary notes explicit would be helpful for future researchers and practitioners as they build upon the authors' published study.

The authors should realise that transparency is of utmost importance in scholarly creativity. Authors should never attempt to ‘hide’ any inconvenient or unwanted facts in an attempt to make a favourable case for publication of the research. In fact, such attempts to hide information would undermine the sanctity of the research project. All steps taken in research design and data analysis should be clearly documented. For example, in a quantitative study it is quite common that authors engage in what is euphemistically called ‘data cleaning’. If authors had a set of items measuring a construct and they dropped a couple due to poor factor loadings, it would be a good idea to document this process in the article with an explanation. Again, if there were certain respondents whose data were discarded, such actions should be documented and justified in the article. If some hypotheses that were originally in the model were not supported, it is preferable not to change the research model just so as to ensure that all hypotheses are supported; instead, discussions about all the originally hypothesised links should be included. Authors should understand that non-significant relationships also support the cause of knowledge advancement and failing to report them can be interpreted as an unethical behaviour. Of course, the reviewers and editors (and readers, if the study is published) will never likely know the ‘original’ model that the authors had in mind. Therefore, the onus is solely on the authors' integrity and their commitment to knowledge advancement in a righteous manner.

Similar arguments can be made for a qualitative study. In a qualitative study, the authors should be mindful about reporting conclusions that are faithful to the genre of the qualitative research they are conducting. For example, the authors should not attempt to theorise ‘forcefully’ if they are conducting a primarily inductive study (nor should reviewers require them to do so!); instead, their theoretical arguments must be reasonably consistent with (and emerge from) the data that they have obtained. They certainly cannot fabricate interview data in order to plug a hole in their evidence base.

What is important is to understand that improving clarity of their empirical efforts (in the article) is an ethical duty of the authors. A clear documentation of all empirical steps taken helps the editors and reviewers ascertain the value and rigour of the work, and its possible impact on future research and practice.

In this issue of the ISJ, we present eight articles and two book reviews.

In the first article, Wu et al. (2024) investigate the effect of task descriptions on solvers' participation by focusing on informational and affective linguistic signals. They validate a model by analysing 13,929 descriptions posted in single-winner tasks on epwk.com, a Chinese competitive crowdsourcing platform. For informational linguistic signals, the results reveal that there are inverted U-shaped relationships between both concreteness and specificity and solver participation, whereas linguistic accuracy has a positive effect on solver participation. For affective linguistic signals, positive emotional words have a positive relationship with solver participation, whereas negative emotional words have the opposite effect. Theoretical and practical implications are discussed.

In the second article, Lee et al. (2024) delve into the dynamics of building digital resilience to manage crises. Through an empirical investigation of Taiwan's response to the COVID-19 pandemic, they unpacked four digital orchestration approaches that together constitute an effective strategy for tackling multidimensional and unforeseen crisis-related events and concerns. They also demonstrate how a variety of digital resources can be deployed and utilised. Their conceptual model on digital resilience in the making goes beyond the traditional capability-based theorisation of digital resilience and instead moves toward a process-oriented approach in addressing multiple tensions and challenges arising from crisis conditions.

In the third article, Karanasios et al. (2024) explore the consequences of using social media in various ways in the context of emergencies in multiple organisations under differing logics. This situation is particularly critical in fields like emergency management where fragmented and inconsistent information is problematic. They undertook a comprehensive qualitative study with 27 organisations including emergency, government, non-government, private, and community entities. The findings enhance understanding of the coevolution of logics and digital technology enactment within an organisational field. The authors present a theoretical model that highlights mutual influence between organisational logics and social media usage. They present a framework capturing the breadth of information flow across an organisational field. These contributions advance theoretical insight into institutional dynamics and improve our understanding of the role of social media in organisational fields. The authors also discuss the practical implications of their findings.

In the fourth article, Srivastava et al. (2024) theorise the mechanisms through which organisational citizenship behaviour (OCB) fosters positive work attitudes among IT professionals. The authors ground their research in self-perception and self-determination theories, hypothesizing the relationships between IT professionals' OCB and their affective attitudes toward their organisation and job, as being mediated by their cognitive evaluations of the ‘meaning of their IT work’. They test the model with data collected through a large-scale two-wave survey design from a multinational IT-services company. The results offer a nuanced understanding of the relationship between OCB and positive work attitudes for IT professionals, which have significant implications for research and practice.

In the fifth article, Recker et al. (2024) examine the context of responsible production and consumption, reporting on Vytal, an innovative “scale up” (a rapidly growing young firm) that has managed to become the world's largest provider of digitalized reusable packaging solutions in the food retail sector. The unique challenge of Vytal was to grow their business both in the online world through a digital platform app that must attract both consumers and food providers such as canteens or restaurants, and in the physical food retail world where food containers move around, get dirty, and need cleaning. Vytal navigated this challenge successfully and this article conceptualises the lessons learnt from their growth in a framework that provides recommendations for other firms operating online-to-offline business models.

In the sixth article, Zhang et al. (2024) remark that online learning platforms provide an opportunity for self-directed learning; however, they often encounter difficulties in maintaining learners' engagement. This study builds upon normative influence theories and explores the impact of peer information on online learning engagement and outcomes, specifically in an online learning setting devoid of external incentives such as rewards or performance evaluations. To investigate this, a field experiment was conducted on an online learning platform. The findings indicate that the mere sharing of information regarding peers' active learning behaviour does not necessarily enhance engagement. However, it does exhibit a positive influence when accompanied by course-related question interventions. This research contributes to our understanding of how peer influence can be utilised to improve engagement and offers practical insights for addressing the challenge of low engagement in online learning settings where learners typically learn in isolation, without external incentives.

In the seventh article, Liao et al. (2024) examine the social networks present in livestreaming contexts. They propose that both centralised and decentralised networks can coexist within multi-level bimodal platforms via various role-based subgroups with different types of decision-makers. Drawing on social impact theory, they examine the role of information from host-audience centralised and host–host decentralised networks in shaping subscription increment and herding effects. Using a panel dataset, they find that bidirectional ties in host–host networks strengthen both the acquisition of fans and the herding effect in the host-audience decentralised network, with hosts of lower social status gaining more fans than those with higher status in bidirectional ties. This study contributes to the understanding of social network structure, herding effect, social impact theory and livestreaming by problematizing core assumptions and offering a contextual explanation of livestreaming. Moreover, their work provides practitioners with valuable insights into leveraging network effects for hosts' success in livestreaming.

In the eighth article, Chamakiotis et al. (2024) use a novel methodology involving video diaries and follow-up interviews to explore ‘contemporary boundary work’, that is, the practices individuals develop to manage their boundaries between ‘work’ and ‘life’. Premised on their critique that existing frameworks fail to accurately explain this, they creatively adopt the lenses of ‘hybridity’ (fusion of boundaries) and ‘liminality’ (a state of suspension/in-betweenness) in combination to unpack how the interplay of the two enables or undermines desired boundary work outcomes. Their findings highlight individuals' creative agency in bringing hybridity and liminality together as part of their everyday boundary work. This study offers an important advancement in the field of digital technologies and boundary work, moving away from narrower understandings of contemporary boundary work and providing new conceptual combinations (i.e., the interplay between hybridity and liminality) that could be used to explain additional phenomena in the IS field and beyond.

Finally, we present two reviews of recently published books: ‘Deep Fakes: Algorithms and Society’ and ‘Digital transformation: Understanding business goals, risks, processes and decisions’.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Information Systems Journal
Information Systems Journal INFORMATION SCIENCE & LIBRARY SCIENCE-
CiteScore
14.60
自引率
7.80%
发文量
44
期刊介绍: The Information Systems Journal (ISJ) is an international journal promoting the study of, and interest in, information systems. Articles are welcome on research, practice, experience, current issues and debates. The ISJ encourages submissions that reflect the wide and interdisciplinary nature of the subject and articles that integrate technological disciplines with social, contextual and management issues, based on research using appropriate research methods.The ISJ has particularly built its reputation by publishing qualitative research and it continues to welcome such papers. Quantitative research papers are also welcome but they need to emphasise the context of the research and the theoretical and practical implications of their findings.The ISJ does not publish purely technical papers.
期刊最新文献
Issue Information Issue Information Issue Information Digital transformation in Latin America: Challenges and opportunities Examining formation and alleviation of information security fatigue by using job demands–resources theory
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1