MetaTOC stay on top of your field, easily

Information Systems Journal

Impact factor: 1.381 5-Year impact factor: 2.376 Print ISSN: 1350-1917 Online ISSN: 1365-2575 Publisher: Wiley Blackwell (Blackwell Publishing)

Subject: Information Science & Library Science

Most recent papers:

  • Violations of health information privacy: The role of attributions and anticipated regret in shaping whistle‐blowing intentions.
    Mark Keil, Eun Hee Park, Balasubramaniam Ramesh.
    Information Systems Journal. September 29, 2017
    We examine the role of attributions, the seriousness of wrongdoing, and emotion in shaping individuals' whistle‐blowing intentions in the context of health information privacy violations. Based on 3 studies in which the intentionality of wrongdoing and the stability of wrongdoing were manipulated independently, we found consistent evidence that the intentionality of wrongdoing affects anticipated regret about remaining silent. The findings regarding the effect of stability, however, were mixed. In study 1, the stability of wrongdoing was found to affect anticipated regret about remaining silent, and in studies 2 and 3, stability was found to have a direct effect on whistle‐blowing intention but no effect on anticipated regret about remaining silent. In the 3 studies, the seriousness of wrongdoing was found to have an effect on whistle‐blowing intentions, but this effect was mediated by anticipated regret about remaining silent. Implications for research and practice are discussed.
    September 29, 2017   doi: 10.1111/isj.12168   open full text
  • Information from social networking sites: Context collapse and ambiguity in the hiring process.
    Jacqueline C. Pike, Patrick J. Bateman, Brian S. Butler.
    Information Systems Journal. September 15, 2017
    Forming impressions of job candidates is a challenging process, one characterized by ambiguity brought about by the uncertainty associated with making decisions and judgments. To reduce ambiguity, hiring professionals have established policies and procedures to facilitate the sourcing and use of information about a candidate. However, recently, a public source of information is increasingly being used—information from social networking sites (SNSs). While conventional wisdom says more information is better and can help make decisions less ambiguous, this relationship may not be as straightforward as expected when facing assessments of candidates. This paper examines two such aspects, information‐task quality and context collapse, and their collective impact on ambiguity when making an assessment of a job candidate. Using data from an online survey‐based experiment, the findings suggest information from SNSs can be useful, yet can create ambiguity for decision makers because of context collapse made possible by SNS technologies.
    September 15, 2017   doi: 10.1111/isj.12158   open full text
  • Trajectory of Affordances: Insights from a case of telemedicine in Nepal.
    Devinder Thapa, Maung K. Sein.
    Information Systems Journal. September 14, 2017
    Although Affordance Theory has become increasingly influential in the Information Systems (IS) literature, the exact process through which the affordances of IT are actualised is less studied. In this paper, we build on a realist ontology of affordance and an interpretive epistemology of how affordances are perceived and actualised to trace the process of actualisation. On the basis of insights drawn from a case study of a telemedicine project in a remote mountainous region of Nepal, we develop a concept, which we call the “Trajectory of Affordances.” Trajectory of Affordances captures the complex relations between affordances of IT and the role of goal‐oriented actors who perceive and then play a vital role in actualising them, using capabilities that are enabled by facilitating conditions to take the necessary action. Trajectory of Affordances shows that the affordances of IT can travel from perception to actualisation through multiple paths, sometimes clustering together, and in the process, often lead to the emergence of new affordances.
    September 14, 2017   doi: 10.1111/isj.12160   open full text
  • Employee dispositions to job and organization as antecedents and consequences of information systems use.
    Hillol Bala, Akshay Bhagwatwar.
    Information Systems Journal. August 30, 2017
    Organizations implement information systems to improve employee productivity and engender favourable organizational outcomes. Although there is evidence of positive outcomes of system use, research has suggested that system use may lead to negative consequences for employees and organizations. There has been limited research that focuses on how employees' use of information systems in the workplace is associated with their positive and negative dispositions to job and organization. We develop and test a model that posits that dispositions to job (ie, job satisfaction, job security, job anxiety, and emotional exhaustion), and organization (ie, organizational commitment and organizational trust) will play a dual role of antecedents and consequences of system use. We conducted 2 longitudinal studies in the context of 2 different systems—a functional system and an enterprise system—and found support for our hypotheses (N = 257 and 181, respectively). We found that preimplementation job and organizational dispositions significantly predicted both lean and rich measures of system use. Further, we found that rich measures of system use (ie, cognitive absorption use and deep structure use) had differential impacts on postimplementation employee dispositions—functional system use had a positive impact and enterprise system use had a negative impact. Overall, our findings offer a comprehensive understanding of system use, and its antecedents and consequences for employees in organizations.
    August 30, 2017   doi: 10.1111/isj.12152   open full text
  • Multiple social media in the workplace: Contradictions and congruencies.
    Emma Forsgren, Katriina Byström.
    Information Systems Journal. August 30, 2017
    In this paper, we report an investigation on the use of multiple social media in knowledge work and explore the contribution of activity theory for such a study. As social media are increasingly adopted at work, there is a demand to understand how they are being incorporated. This study focuses on how social media may improve or reduce coherence in work activities, and for this purpose, we use activity theory as an analytical lens to conceptualise social media usage in a Scandinavian software development company. The qualitative data, consisting of interviews and observations, were analysed to capture the mediating role of social media for information sharing within and across work activities. We found social media in general helpful to maintain coherence in terms of sharing work‐related information, improving ambient awareness, as well as for socialising, but they also caused inconsistencies in use and adoption. In addition, we found that social media served different purposes in different activity systems, causing both contradictions and congruencies; what was seen as a benefit for some work activities appeared as a limitation for others (eg, concerning pace and aims of information sharing). In our findings through the lens of activity theory, we observed how objects, although they were shared, were fractionalised in networked activities. Our conclusion is that despite the still unoptimised functionality, social media do bring coherence in work activities in a decentralised work environment.
    August 30, 2017   doi: 10.1111/isj.12156   open full text
  • Getting the control across: Control transmission in information systems offshoring projects.
    Magnus Mähring, Martin Wiener, Ulrich Remus.
    Information Systems Journal. August 15, 2017
    Offshoring of information systems (IS) projects has become a widespread global practice. While prior research suggests that controlling, and communicating with, offshore vendors represent key managerial challenges, the topic of how control is communicated, or transmitted, from client to vendor has been widely neglected. Our study focuses on control transmission in the critical relationship between client and offshore vendor managers, and its impact on the performance of IS offshoring projects. Drawing on a matched‐pair survey with 172 client and vendor managers from 86 projects, our results provide several new insights to the IS literature: First, we find that both behaviour and outcome control have the capacity to be transmitted consistently in lateral IS offshore project relationships. Second, our results show that consistent transmission translates into a performance effect only for outcome control. Third, we find that high‐performing offshore projects are characterized by both greater control transmission consistency and greater use of outcome control compared to low‐performing projects. In sum, our study extends theory on IS project control by highlighting that effective control of IS offshoring projects is not only about selecting proper controls but also about ensuring that, as a controller, you get the control across to the controllee.
    August 15, 2017   doi: 10.1111/isj.12155   open full text
  • Avocados crossing borders: The problem of runaway objects and the solution of a shipping information pipeline for improving international trade.
    Thomas Jensen, Ravi Vatrapu, Niels Bjørn‐Andersen.
    Information Systems Journal. August 14, 2017
    This paper investigates the case of shipments of containers with avocados from farmers in Africa to grocery store shelves in the European Union. We find 3 predominant challenges to containerized shipping that effectively become trade barriers: international trade cost, lead time uncertainty, and security risks. We use activity theory to describe, understand, and analyze the shipping activity in the international trade ecosystem with focus on physical objects and their related information. We find that the shipment becomes problematic and can be characterized as a runaway object in the heterogeneous and multiple organizational setting of international trade. Our analysis of shipping reveals (1) inefficient collaboration across loosely coupled activity systems and (2) fragmented information infrastructures. We propose the solution of Shipping Information Pipeline, a shared information infrastructure, thus facilitating collaboration in containerized shipping and contributing to lowering trade barriers. Shipping Information Pipeline can significantly improve containerized shipping resulting in estimated potential benefits of up to 4.7% growth in global GDP.
    August 14, 2017   doi: 10.1111/isj.12146   open full text
  • Will cloud computing make the Information Technology (IT) department obsolete?
    Joseph Vithayathil.
    Information Systems Journal. July 14, 2017
    The rapid adoption and growth of cloud computing is creating unprecedented change in the manner in which IT services are procured, managed, and deployed. Cloud computing is forcing firms to rethink traditional IT governance practices while raising new and fundamental questions for scholars and practitioners. This paper identifies the major areas of change and highlights governance issues that arise with the adoption of cloud computing. The focus of this paper is on the organizational impact on IT governance under cloud computing. The paper posits (1) that successful IT departments under cloud computing will transform into new roles that address internal customer‐facing issues and external cloud‐facing issues, (2) firms that mitigate information asymmetry under cloud computing will show higher firm performance, and (3) firms that offer superior cloud‐sourced IT service attributes of internal prices, quality, variety, and competition in the cloud will show higher firm performance.
    July 14, 2017   doi: 10.1111/isj.12151   open full text
  • Contextualizing a professional social network for health care: Experiences from an action design research study.
    Tobias Mettler.
    Information Systems Journal. June 27, 2017
    Professional social networks (PSN) are online environments where practitioners can present themselves, get in contact and socialize with coworkers, share and discuss ideas, or exchange business‐related knowledge. Despite the fact that collaboration and information sharing are becoming more relevant for delivering high‐quality services, PSN are not yet widely adopted in complex domains such as health care. While most of the literature is still focusing on the exposition of the unbound potential of PSN, this paper seeks to clarify the question of how to capture and manage the professional identity of an industry such that PSN can be purposefully anchored in the working context. Following an Action Design Research approach, we describe practical design propositions and possible tensions along the contextualization of a PSN, which was specifically catered for improving interprofessional and interorganizational collaboration in and between hospitals. We identify several implications for future research. In particular, we explain intended and unintended uses of PSN in hospitals and provide metaphors for explaining possible alternative understandings of domain engineering.
    June 27, 2017   doi: 10.1111/isj.12154   open full text
  • Digital transformation by SME entrepreneurs: A capability perspective.
    Liang Li, Fang Su, Wei Zhang, Ji‐Ye Mao.
    Information Systems Journal. June 20, 2017
    This research investigates how entrepreneurs of small and medium enterprises (SMEs) with inadequate capabilities and limited resources drove digital transformation in their companies, a phenomenon that remains under‐researched in the extant literature. We conduct qualitative research on digital transformation to cross‐border e‐commerce undergone by 7 SMEs on the Alibaba digital platform. We inductively derive a process model that aims to describe and explain how SME entrepreneurs, with support from the digital platform service provider, drive digital transformation through managerial cognition renewal, managerial social capital development, business team building, and organizational capability building. This model expands our understanding of both digital entrepreneurship and digital transformation. It also presents new insights into how digital platform service providers can help SMEs transform and compete.
    June 20, 2017   doi: 10.1111/isj.12153   open full text
  • To sell or not to sell: Exploring sellers' trust and risk of chargeback fraud in cross‐border electronic commerce.
    Yue Guo, Yongchuan Bao, Barnes J. Stuart, Khuong Le‐Nguyen.
    Information Systems Journal. June 01, 2017
    Over the past few decades, chargeback fraud from buyers has been identified as a major risk faced by online sellers, particularly small‐ and medium‐sized enterprises, in cross‐border electronic commerce. However, most previous studies have focused on trust and perceived risk from the buyers' perspective and in domestic online marketplaces, while neglecting the importance of sellers' trust and perceived risk in the success of online transactions and the significance of cross‐border transactions. To fill this gap in the literature, this study examines both the antecedents and the impacts of sellers' trust in buyers and their perceived risk of chargeback fraud on sellers' intention to trade with buyers in the context of cross‐border e‐commerce. To this end, we develop a conceptual model that identifies a set of institutional mechanisms to enhance sellers' trust and reduce their perceived risk. Hypotheses are tested via a survey of 443 sellers on DHgate.com, one of the major cross‐border e‐commerce websites connecting the small‐ and medium‐sized enterprises of mainland China with overseas buyers. Our research makes concrete contributions to e‐commerce research and generates useful insights for third‐party online transaction platforms and online trade policy makers.
    June 01, 2017   doi: 10.1111/isj.12144   open full text
  • Sociocultural transitions and developmental impacts in the digital economy of impact sourcing.
    M.S. Sandeep, M.N. Ravishankar.
    Information Systems Journal. May 26, 2017
    Impact sourcing (ImS) is the practice of bringing digitally enabled outsourcing jobs to underprivileged communities. While such jobs are attractive and improve life chances, situated ImS employees face the difficult task of transitioning from their traditional communities to the relatively modern ImS workplace. These transition experiences expose them to a variety of work‐life challenges and, at the same time, serve as occasions for development. This paper draws on an inductive qualitative study of an up and coming Indian ImS company and explores how ImS employees experience sociocultural transitions and realize developmental impacts. The findings suggest that compartmentalization and integration strategies help ImS employees manage boundaries arising from the contrasting cultural expectations of the community and the workplace. Impact sourcing employees respond to sociocultural transition challenges in the workplace through a series of cognitive adjustments, which involves the creation of fictive kinships, job crafting, and experimenting with provisional selves. Furthermore, the analysis shows how intense engagement with sociocultural transitions can lead to the development of crucial individual and collective capabilities. In closing, a model of capability development of ImS employees is outlined, and the implications for ImS companies are discussed.
    May 26, 2017   doi: 10.1111/isj.12149   open full text
  • Declarations of significance: Exploring the pragmatic nature of information models.
    Paul Beynon‐Davies.
    Information Systems Journal. May 08, 2017
    This paper considers the juncture experienced between information modelling in theory and information modelling in practice. It identifies the basis of this juncture in an unsatisfactory ontological basis for information modelling. Using both the early and more recent work of Searle, it establishes the need for information models to be framed in terms of communicative patterns significant within some delimited institutional domain. Such communicative patterns are visualised in terms of an innovative artefact known as a pattern comic. The propositional content of communicative acts within such patterns is then expressed as a set of binary relations, which can be transformed into various visualisations of an information model. Patterns of communicative action evident in the domain of medical emergency response are used throughout to illustrate this pragmatic approach to constructing information models.
    May 08, 2017   doi: 10.1111/isj.12148   open full text
  • The pastoral crowd: Exploring self‐hosted crowdfunding using activity theory and social capital.
    Rob Gleasure, Lorraine Morgan.
    Information Systems Journal. May 08, 2017
    As crowdfunding technologies mature, designers and practitioners are continuing to discover new paradigms for fund‐raising activities. One such paradigm seeks to complement or replace third‐party crowdfunding websites by embedding crowdfunding technologies directly into fund seekers' personal websites. This promises more control and customisation for fund seekers yet also distances fund‐seeking activities from the established crowds on websites such as Kickstarter and Indiegogo. Consequently, fund seekers adopting this paradigm must be capable of gathering and sustaining a suitable crowd that does not already exist in any one location. However, not all organisations are likely to possess the social resources to meet this challenge. Of those that do, little is known about how they might leverage these resources or the manner in which specific resources have an impact. Thus, the objective of this study is to explore the social resources that enable self‐hosted crowdfunding activities. In particular, this research models these activities by leveraging 2 a priori theoretical lenses: activity theory and social capital theory. These are applied to analyse an extreme case of self‐hosted crowdfunding, the funding of Star Citizen. Observations from this case are used to develop a propositional model that links different types of social capital with specific elements of self‐hosted crowdfunding.
    May 08, 2017   doi: 10.1111/isj.12143   open full text
  • Unravelling causal and temporal influences underpinning monitoring systems success: A typological approach.
    Federico Iannacci, Tony Cornford.
    Information Systems Journal. May 08, 2017
    This paper is concerned with the causal and temporal underpinnings of information systems success. It uses a typological approach based on fuzzy‐set Qualitative Comparative Analysis and process tracing. It investigates success across multiple cases of information systems adopted for monitoring the disbursement and use of resources within the European Social Fund. The study unravels the causal mechanisms and temporal pathways underpinning success in these systems. It develops a typological theory of monitoring systems success that reveals the temporal pathways embedded within individual cases, as well as broader theoretical patterns emerging across cases. Theoretical, methodological, and practical implications are discussed.
    May 08, 2017   doi: 10.1111/isj.12145   open full text
  • Transactive memory systems and Web 2.0 in knowledge sharing: A conceptual model based on activity theory and critical realism.
    Boyka Simeonova.
    Information Systems Journal. May 02, 2017
    The aim of this paper is to advance understanding of interactive knowledge sharing (KS) processes through exploring the role of transactive memory systems (TMSs) and Web 2.0. In the context of the information systems literature, there is little focus on their particular role in KS. To address this gap, this paper develops a conceptual model based on activity theory and critical realism outlining the role of TMS and Web 2.0 as mediating tools. This paper further reveals that their use as tools depends on deeper underlying structures/factors embedded within the community, namely, informal networks and trust among people. The new conceptual model and theoretical propositions are then illustrated by a qualitative study undertaken in Bulgarian organisations. This illustrative case provides support for the model, where TMS and Web 2.0 are found to facilitate KS. It further demonstrates that informal networks and trust among people support the use and the positive effects of these tools. The contribution of this paper is in the new analytical approach and conceptual model developed, which advances our understanding of interactive KS by explaining the linkages between the various factors involved.
    May 02, 2017   doi: 10.1111/isj.12147   open full text
  • Using ICT for social good: Cultural identity restoration through emancipatory pedagogy.
    Amber Grace Young.
    Information Systems Journal. April 27, 2017
    This research examines how an oppressed group, the Klamath Tribes of Oregon, used an information communication technology (ICT) for the human development objective of cultural identity restoration, one component of emancipation. Within this manuscript is depicted a process model of how ICT tools can be used for human development through emancipatory pedagogy, ie, the communication of knowledge in a way that promotes critical reflection and collective action. Combining interpretive and critical methods, I describe how the Klamath's ICT reflected the emancipatory journey of those creating it and empowered the Klamath to lead ICT users toward emancipation. An interpretive approach revealed that ICT framing tools promoted awareness of the Klamath, awareness of the problem the Klamath sought to address, and awareness of societal systems of power that enforced the Klamath's problem, while ICT tactic tools enabled “the aware” to engage in solutions. Notably, the Klamath shirked prevailing practices in ICT for development. Consistent with my critical approach, I use the Klamath case to suggest normative recommendations for the use of ICT for social good.
    April 27, 2017   doi: 10.1111/isj.12142   open full text
  • Digitally enabled affordances for community‐driven environmental movement in rural Malaysia.
    Yenni Tim, Shan L. Pan, Shamshul Bahri, Ali Fauzi.
    Information Systems Journal. March 08, 2017
    The immense environmental challenges facing society today have necessitated a research effort toward exploring digitally enabled solutions for environmental problems. Only limited research exists today to inform our understanding on how technology could assist groups of individuals in cultivating collective commitment and engaging in actions for environmental sustainability. By presenting an in‐depth case study of a social media‐enabled grassroots environmental movement in rural Malaysia, this paper aims to illuminate and understand an underresearched phenomenon of community‐driven environmental sustainability. This study makes 2 contributions: (1) we draw on the perspective of technology affordances to shed light on both the enabling power and unintended consequences of social media in the pursuit of environmental sustainability; and on that account, (2) we contribute rich, empirically informed insights toward understanding the underresearched phenomenon of digitally enabled, community‐driven environmental sustainability.
    March 08, 2017   doi: 10.1111/isj.12140   open full text
  • Email adaptation for conflict handling: A case study of cross‐border inter‐organisational partnership in East Asia.
    Joyce Yi‐Hui Lee, Niki Panteli, Anne Marie Bülow, Carol Hsu.
    Information Systems Journal. March 01, 2017
    This paper explores the context of email‐based communication in an established but fragile, inter‐organisational partnership, which was often overlain with conflict. Drawing upon adaptation theory, this study explores how participants adapt to the use of email to handle conflict. Extensive data were obtained during a 6‐month field study of a case of cross‐border inter‐organisational collaboration in East Asia. We observed that the individuals involved in the cross‐border partnership used email as a lean form of communication to stop covert conflict from explicitly emerging. In contrast to prior research on the leanness of email in managing conflict, we found that under the described conflict situation the very leanness of email was appreciated and thus, exploited by those concerned to manage the conflict situation. Specifically, we identified 4 key conflict‐triggered adaptation strategies, namely, interaction avoidance, disempowering, blame‐protection, and image‐sheltering that drove the ways in which email was adapted to maintain organisational partnerships under conflict.
    March 01, 2017   doi: 10.1111/isj.12139   open full text
  • Winning the SDG battle in cities: how an integrated information ecosystem can contribute to the achievement of the 2030 sustainable development goals.
    Jacqueline Corbett, Sehl Mellouli.
    Information Systems Journal. January 27, 2017
    In 2015, the United Nations adopted an ambitious development agenda composed of 17 sustainable development goals (SDGs), which are to be reached by 2030. Beyond SDG 11 concerning the development of sustainable cities, many of the SDGs target activities falling within the responsibility of local governments. Thus, cities will play a leading role in the achievement of these goals, and we argue that the information systems (IS) community must be an active partner in these efforts. This paper aims to contribute to the achievement of the SDGs by developing a conceptual model to explain the role of IS in building smart sustainable cities and providing a framework of action for IS researchers and city managers. To this end, we conduct grounded theory studies of two green IS used by an internationally recognized smart city to manage water quality and green space. Based on these findings, we articulate a model explaining how an integrated information ecosystem enables the interactions between three interrelated spheres – administrative, political and sustainability – to support the development of smart sustainable cities. Moving from theory to practice, we use two real‐world scenarios to demonstrate the applicability of the model. Finally, we define an action framework outlining key actions for cities and suggest corresponding questions for future research. Beyond a simple call‐to‐action, this work provides a much‐needed foundation for future research and practice leading to a sustainable future for all. © 2017 John Wiley & Sons Ltd
    January 27, 2017   doi: 10.1111/isj.12138   open full text
  • How IT executives create organizational benefits by translating environmental strategies into Green IS initiatives.
    Fabian Loeser, Jan Recker, Jan vom Brocke, Alemayehu Molla, Ruediger Zarnekow.
    Information Systems Journal. January 27, 2017
    Organizations increasingly recognize that environmental sustainability is an urgent problem. Green information systems (Green IS) initiatives can assist organizations in reaching their environmental goals by providing the ability to reduce the environmental impacts of information technology (IT) manufacturing, operations and disposal; facilitate transparency and enhance the efficiency of organizational resources and business processes; and foster eco‐products through technological innovation. However, the nature and type of benefits such initiatives can accrue remain poorly understood, and accordingly, IT executives struggle to integrate environmental aspects in the corporate strategy and to launch Green IS initiatives. This paper clarifies the mechanisms that link organizational beliefs about environmental sustainability to Green IT and Green IS actions undertaken, and the organizational benefits that accrue from these actions. Using data from a global survey of 118 senior‐level IT executives, we find that Green IS strategies mediate the relationship between environmental orientation and the implementation of Green IT practices and Green IS practices, which in turn lead to organizational benefits in the form of cost reductions, corporate reputation enhancement and Green innovation capabilities. Our findings have implications for the potential of IS to enable organizations' environmental sustainability and also for the differentiation of Green IT and Green IS practices. © 2017 John Wiley & Sons Ltd
    January 27, 2017   doi: 10.1111/isj.12136   open full text
  • IT professionals' person–organization fit with IT training and development priorities.
    Stephen C. Wingreen, J. Ellis Blanton.
    Information Systems Journal. January 20, 2017
    Person–organization fit (P–O fit) research and practice have been hindered on account of the difficulty of operationalizing the richness, complexity and subjectivity of the P–O fit phenomenon. P–O fit for technology professionals is further complicated by the rapidly changing demands the IT profession places on its constituents to continually engage in training and development. A human capital perspective is adopted as a lens through which to view the IT professional's P–O fit, and Social Cognitive Theory is proposed as a framework within which to incorporate the principles of Concourse Theory, which is the guiding philosophy of Q‐Methodology and Q‐sorts. The Q‐methodology was used as a means to operationalize the IT professional's P–O fit with respect to IT training and development. Analysis revealed five distinct P–O fit types of perspectives that explained 35% of the population variance. Post‐hoc analysis of the five types revealed that they are interpretable through the lens of the human capital perspective. The results show promise for continued research on the subject, as well as implications for both researchers and practitioners. © 2017 John Wiley & Sons Ltd
    January 20, 2017   doi: 10.1111/isj.12135   open full text
  • Entrepreneurial impact sourcing: a conceptual framework of social and commercial institutional logics.
    Shaji Khan, Mary Lacity, Erran Carmel.
    Information Systems Journal. January 20, 2017
    This article answers calls for better characterizations of impact sourcing given its potential to create social impacts in conjunction with global sourcing. It introduces a conceptual framework consisting of four dimensions drawn from entrepreneurship literature: primary mission, success criteria, resource mobilization and innovation approach – that characterize entrepreneurial impact sourcing service providers. These four dimensions are anchored across ideal types of social and commercial institutional logics to explicitly account for and capture the dual social and commercial value orientations of impact sourcing service providers as acknowledged in the literature. We evaluate the utility of this framework by using it to assess a US‐based business process outsourcing social enterprise that focuses on the underserved workforce of military veterans and spouses of military personnel. We found that this firm used social logic for both the firm's primary mission and the firm's resource mobilization; it used commercial logic for its success criteria, and it used both logics for its innovation. Our analysis of the case substantiates the applicability of the framework for capturing variation in how impact sourcing providers may selectively draw upon different logics across the four dimensions. © 2017 John Wiley & Sons Ltd
    January 20, 2017   doi: 10.1111/isj.12134   open full text
  • Distilling a body of knowledge for information systems development.
    Nik Rushdi Hassan, Lars Mathiassen.
    Information Systems Journal. January 18, 2017
    As a contribution towards consolidating the information systems (IS) field, we offer a systematic method for distilling a canonical body of knowledge (BOK) for information systems development (ISD), an area that historically accounts for as much as half of all IS research. Based on an integrative synthesis of the literature, we present a map of the most significant ISD research, uncover gaps in its canons and suggest fruitful lines of inquiry for new research. Our review combines citation analysis, which identifies the field's evidence of cumulative tradition, with computer‐aided textual analysis, a hermeneutically guided method that organizes the fragmented corpus of ISD literature into coherent knowledge areas. From a pool of over 6500 articles published in the IS Senior Scholars' Basket of Journals, we find 940 IS citation classics, and from that list, 466 ISD articles that offer canonical ISD knowledge distinctive to IS and complementary to other disciplines such as software engineering and project management. From this study, we offer two contributions: (1) a justification for an ISDBOK grounded in the theory of practice and professionalism, and (2) a canonical map of disciplinary ISD knowledge with areas that have demonstrated cumulative tradition and others that require the attention of IS scholars. © 2017 John Wiley & Sons Ltd
    January 18, 2017   doi: 10.1111/isj.12126   open full text
  • Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives.
    Robert Willison, Merrill Warkentin, Allen C. Johnston.
    Information Systems Journal. December 02, 2016
    Although employee computer abuse is a costly and significant problem for firms, the existing academic literature regarding this issue is limited. To address this gap, we apply a multi‐theoretical model to explain employees' intentions to abuse computers. To understand the motives for such behaviour, we investigate the role of two forms of organizational justice – distributive and procedural – both of which provide explanations of how perceptions of unfairness are created in the organizational context. By applying deterrence theory, we also examine the extent to which formal sanctions influence and moderate the intentions to abuse computers. Finally, we examine how the potential motives for abuse may be moderated by techniques of neutralization, which allow offenders to justify their actions and absolve themselves of any associated feelings of guilt and shame. Utilizing the scenario‐based factorial survey method for our experimental design, we empirically evaluated the association between these antecedents and the behavioural intention to violate Information systems (IS) security policies in an environment where the measurement of actual behaviour would be impossible. Our findings suggest that individual employees may form intentions to commit computer abuse if they perceive the presence of procedural injustice and that techniques of neutralization and certainty of sanctions moderate this influence. The implications of these findings for research and practice are presented. © 2016 John Wiley & Sons Ltd
    December 02, 2016   doi: 10.1111/isj.12129   open full text
  • Diffusion of knowledge in social media networks: effects of reputation mechanisms and distribution of knowledge roles.
    Taha Havakhor, Amr A. Soror, Rajiv Sabherwal.
    Information Systems Journal. November 29, 2016
    Social media platforms serve as important tools for diffusing knowledge within organizations. The factors affecting knowledge diffusion through social media networks (SMNs) need to therefore be better understood. Accordingly, this paper focuses on two SMN‐specific characteristics – reputation mechanisms and the distribution of knowledge roles – which are argued to enhance and enable, respectively, the smooth transfer of knowledge in a SMN. To examine their effects, we distinguish between two types of reputation mechanisms – adaptive and objective – and across three distinct knowledge roles in SMNs: seekers, contributors and brokers. We argue that the extent of knowledge diffusion in the SMN depends on the type of mechanism and the relative distribution of these three roles. Using data collected through an agent‐based simulation, we find that (a) the distribution of knowledge roles affects knowledge diffusion, with distributions consisted of more brokers outperforming others and (b) objective reputation mechanisms outperform adaptive mechanisms. Furthermore, we find that reputation mechanisms and distribution of knowledge roles interact to influence knowledge diffusion. The study's implications for future research and practice are discussed in the light of its limitations. © 2016 John Wiley & Sons Ltd
    November 29, 2016   doi: 10.1111/isj.12127   open full text
  • Driving business transformation toward sustainability: exploring the impact of supporting IS on the performance contribution of eco‐innovations.
    Andre Hanelt, Sebastian Busse, Lutz M. Kolbe.
    Information Systems Journal. November 29, 2016
    Information systems (IS) can foster business transformation toward sustainability on a large scale by supporting green technologies, thereby creating hybrid physical–digital solutions that are able to fulfil organizational performance requirements and contribute to sustainable business practices. These supporting IS provide an alternative path to corporate sustainability rather than just contributing to the ‘greening’ of business practices by aiming to improve the organizational performance impact of environmental advantageous innovations, which in turn fosters their adoption. Employing a multiple case study comprising eight companies that have implemented such eco‐innovations (specifically electric vehicles) in their business processes, our findings indicate that the organizational performance contribution of eco‐innovations is improved when complemented by supporting IS. This effect is achieved by (1) enhancing the efficiency of the business processes in which the eco‐innovations are deployed, thus increasing eco‐efficiency, and (2) enabling new functionalities, processes and business models that help achieve organizational sustainability goals, thereby driving eco‐effectiveness. With these two aspects, we add two functional affordances – technological flexibility and digital eco‐innovation – to the existing knowledge base of Green IS and point to an elaborated role of IS in sustainability transformation.
    November 29, 2016   doi: 10.1111/isj.12130   open full text
  • Minimum sample size estimation in PLS‐SEM: The inverse square root and gamma‐exponential methods.
    Ned Kock, Pierre Hadaya.
    Information Systems Journal. November 29, 2016
    Partial least squares‐based structural equation modelling (PLS‐SEM) is extensively used in the field of information systems, as well as in many other fields where multivariate statistical methods are used. One of the most fundamental issues in PLS‐SEM is that of minimum sample size estimation. The ‘10‐times rule’ has been a favourite because of its simplicity of application, even though it tends to yield imprecise estimates. We propose two related methods, based on mathematical equations, as alternatives for minimum sample size estimation in PLS‐SEM: the inverse square root method, and the gamma‐exponential method. Based on three Monte Carlo experiments, we demonstrate that both methods are fairly accurate. The inverse square root method is particularly attractive in terms of its simplicity of application. © 2016 John Wiley & Sons Ltd
    November 29, 2016   doi: 10.1111/isj.12131   open full text
  • Metaphors in managerial and employee sensemaking in an information systems project.
    Riitta Hekkala, Mari‐Klara Stein, Matti Rossi.
    Information Systems Journal. November 29, 2016
    This longitudinal study looks at the metaphors used in a public sector information systems development project from the perspective of cognitive metaphor theory (Lakoff & Johnson, ). We examine the use of metaphors by project team members, including representatives of the users, software developers and the managers guiding the project work. The findings indicate that project team members and managers use a rich set of metaphors to make sense of the project and the records management system they are working on. Notably, distinct sets of metaphors are used in different project phases and among the project personnel and management. As the differences in the metaphors also coincide with key events in the trajectory of the project, we contend that metaphors have significant power in sensemaking, influencing action and project outcomes. In particular, we find that in highly ambiguous, knowledge‐intensive situations, metaphor use with unclear intentions and purpose hinders learning and creates more chaos than order. From a practical perspective, our study highlights the relevance of metaphor use for project management. We suggest that intentional selection of metaphors by management could be beneficial for many complex information systems projects. © 2016 John Wiley & Sons Ltd
    November 29, 2016   doi: 10.1111/isj.12133   open full text
  • Rethinking the concept of the IS organization.
    Joe Peppard.
    Information Systems Journal. November 11, 2016
    Do conceptualizations of the information systems (IS) organization reflect findings from research studying requirements for successfully harnessing information, systems and technology to achieve operational and strategic objectives? This paper addresses this question, reporting on an analysis of articles published in leading academic and practitioner journals. It describes how the IS organization is portrayed in these studies and examines the results of this analysis through a sensitizing lens constructed from research that has studied how organizations generate business value from IS. The lens depicts this objective as a quest to harness knowledge that is distributed enterprise wide. The analysis suggests that conceptualisations of the IS organization used by researchers do not reflect the requirements for generating business value from information technology that have been identified in the literature. Whilst highlighting that definitions are vague or more often absent, it challenges the dominant orthodoxy of the IS organization as a separate organizational unit suggesting that it is a more pervasive construct. The implications of this conclusion for practice, research and teaching are considered.
    November 11, 2016   doi: 10.1111/isj.12122   open full text
  • Digitally enabled disaster response: the emergence of social media as boundary objects in a flooding disaster.
    Yenni Tim, Shan L. Pan, Peter Ractham, Laddawan Kaewkitipong.
    Information Systems Journal. October 05, 2016
    In recent times, social media has been increasingly playing a critical role in response actions following natural catastrophes. From facilitating the recruitment of volunteers during an earthquake to supporting emotional recovery after a hurricane, social media has demonstrated its power in serving as an effective disaster response platform. Based on a case study of Thailand flooding in 2011 – one of the worst flooding disasters in more than 50 years that left the country severely impaired – this paper provides an in‐depth understanding on the emergent roles of social media in disaster response. Employing the perspective of boundary object, we shed light on how different boundary spanning competences of social media emerged in practice to facilitate cross‐boundary response actions during a disaster, with an aim to promote further research in this area. We conclude this paper with guidelines for response agencies and impacted communities to deploy social media for future disaster response.
    October 05, 2016   doi: 10.1111/isj.12114   open full text
  • Reconceptualizing object construction: the dynamics of Building Information Modelling in construction design.
    Reijo Miettinen, Sami Paavola.
    Information Systems Journal. September 22, 2016
    The article discusses the concepts of object and object construction through studying the collaborative use of Building Information Modelling (BIM) in construction design. It suggests that a combined BIM model in design can be regarded as an ideal or special object, as suggested by Ilyenkov in his theory of the ideal. The concepts of intermediary object and artefact help in analysing the cycles of construction of such an object in design. BIM models as modifiable digital artefacts contribute to their capability of functioning as tools of individual design work and collaboration as well as means of objectifying the outcomes of design cycles into intermediary objects. We argue that the uses of combined BIM models give birth to a new modality of spatial thought, perception and collaborative problem solving in construction design.
    September 22, 2016   doi: 10.1111/isj.12125   open full text
  • My choice, your problem? Mandating IT use in large organisational networks.
    Andrea Carugati, Walter Fernández, Lapo Mola, Cecilia Rossignoli.
    Information Systems Journal. September 22, 2016
    On the basis of a four‐year exploratory study of a mandatory information systems implementation by an Italian, multibillion‐dollar dairy cooperative with 2200 members, this paper describes how key stakeholders engage in dynamic transformation processes that shape the technology, the users' practices and the organisation itself. In doing so, this study responds to calls for process‐oriented longitudinal explorations and suggests an alternative path of adoption in which the technology becomes the reification of a bi‐directional discourse about the transformation of practices for the entire network of organisations. In presenting this alternative path, this study unveils a five‐phase change process that both altered perceptions of the technology and its possibilities at the same time resolving tensions among the drivers and users of the mandated system. © 2016 Blackwell Publishing Ltd
    September 22, 2016   doi: 10.1111/isj.12120   open full text
  • Entering the field in qualitative field research: a rite of passage into a complex practice world.
    Hameed Chughtai, Michael D. Myers.
    Information Systems Journal. September 22, 2016
    The concept of ‘the field’ is significant in ethnographic research as well as qualitative research methods more generally. However, how a field researcher enters the field is usually taken for granted after gaining access to the field. We suggest that entrance is a distinct phase of fieldwork that differs from negotiating access. Entrance is not a trivial event; rather, it is a rite of passage into a complex practice world and marks a critical field moment. Drawing on our ethnography and insights from hermeneutics and anthropology, we show that a practical understanding of the field represents a fusion of horizons where a fieldworker is thrown. The concept of thrownness highlights the fact that the fieldworkers' own historicity and prejudices affect their entrance into the field; hence, entrance into the field orientates an ethnographer in the field and influences the entire period of fieldwork that follows. Our theorizing is intended as a contribution towards advancing the discussion of qualitative research methods.
    September 22, 2016   doi: 10.1111/isj.12124   open full text
  • Issues that support the creation of ICT workarounds: towards a theoretical understanding of feral information systems.
    Anthony Spierings, Don Kerr, Luke Houghton.
    Information Systems Journal. September 01, 2016
    enterprise system (ES) software is often supplemented independently by end users who develop personal solutions that establish connections between the required business practices and the ES. One solution is a type of information and communications technology workaround, a feral information system (FIS) – defined as a workaround designed to achieve certain requirements by using any information technology tool that an end user uses in conjunction with, or instead of, the mandated information system. To explore this, we conducted a case study at a large utility company. We conclude that feral information systems are not a behavioural deviance. FISs are by‐products of end users seeking operational efficiency, namely, to nullify additional transactional costs imposed by the ES. Our findings suggest that end users of ES will fall into one of four modes of operation: mode 1, where end users submit to the ES; mode 2, where they dismiss the ES; mode 3, where they develop an FIS that remains hidden from the ES proponents; and mode 4, where they operate the FIS in open defiance of the ES proponents. In this research, we deliberately take the practitioner view and, therefore, outline how different pressures help to create an FIS as a response to a poorly mandated ES. We also make a theoretical contribution by exploring issues that lead to workarounds and suggest that future research into these modes of operation can be theorized in future proposed studies.
    September 01, 2016   doi: 10.1111/isj.12123   open full text
  • Information system artefact or information system application: that is the question.
    Juhani Iivari.
    Information Systems Journal. September 01, 2016
    Lee et al. () suggest the concept of information system (IS) artefact as an alternative to information technology (IT) artefact, defining the former as a system of an IT artefact, an information artefact and a social artefact. This paper assesses this suggestion, contrasting it with the concepts of IT artefact and IS application as introduced in the prior IS literature. After this conceptual analysis, the paper discusses the relationships between an IS artefact and design and between an IS artefact and design science. The analysis concludes that an IS artefact is problematic as a unit of design because of the great differences in the designability of its constituent parts. Instead, the paper maintains that an IS application is more appropriate as a unit of design, but an IS artefact may be fruitful as an analytical concept to be used in behavioural science research on the interplay of IT artefact, information artefact and social artefact, or – especially if including IS application design – in action research‐oriented design science research. © 2016 John Wiley & Sons Ltd
    September 01, 2016   doi: 10.1111/isj.12121   open full text
  • Risks to Effective Knowledge Sharing in Agile Software Teams: A Model for Assessing and Mitigating Risks.
    Shahla Ghobadi, Lars Mathiassen.
    Information Systems Journal. August 18, 2016
    We present an empirically grounded and theoretically informed model for the assessment and mitigation of risks to effective knowledge sharing in agile development. The model is anchored in empirical insights from four agile projects across two software companies and in extant research on risk‐strategy analysis and knowledge sharing in software development. We develop the model as part of the long‐standing tradition of presenting risk management models dedicated to specific issues in software development and confirm its practical usefulness in one of the software companies studied. The model offers concepts and processes to assess a project's knowledge sharing risk profile and articulate an overall resolution strategy plan to mitigate the risks. The results highlight how different knowledge sharing risk management profiles can lead to different project performance outcomes. We conclude with a discussion of research opportunities that the results offer software development scholarship. © 2016 John Wiley & Sons Ltd
    August 18, 2016   doi: 10.1111/isj.12117   open full text
  • Open generification.
    Abyot Asalefew Gizaw, Bendik Bygstad, Petter Nielsen.
    Information Systems Journal. July 29, 2016
    To what extent can software ‘travel’ to organizations and countries for which it was not designed for, and how important are local contexts for a successful design and implementation of generic software? Information systems researchers have differing views on this, some emphasizing the strengths of the generic and others the importance of contextual aspects. Contributing to this debate, Pollock and Williams have coined the term generification in order to describe how large vendors succeed in globalizing software packages through management by community, content and social authority. In this paper, we explore an approach that we call open generification, which extends Pollock and Williams' work in the sense that we acknowledge the need for and the feasibility of generic software, but propose an alternative model for the governance of it. Open generification is not about managing the community of users attached to a software package by homogenization or segmentation but aims at addressing the diverse needs of the community the software is expected to serve. Our empirical basis is a longitudinal study of the development of an open‐source health information system software (District Health Information software version 2), which is being used in more than 47 countries. Its success is attributed to a continuous interplay between generic and specific software and continuous cycles of embedding (implementing the global in the local context) and disembedding (taking local innovations into the global). We identify and discuss the contingent mechanisms of this interplay.
    July 29, 2016   doi: 10.1111/isj.12112   open full text
  • Examining the use of status quo bias perspective in IS research: need for re‐conceptualizing and incorporating biases.
    Kyootai Lee, Kailash Joshi.
    Information Systems Journal. July 29, 2016
    Kim & Kankanhalli introduced status quo bias perspective (SQBP) to help understand information systems (hereinafter IS) users' resistance behaviour. Since then, scholars have widely referred to the theoretical perspective to understand user resistance to and adoption of new IS and information and communication technologies (hereinafter ICT). However, our analysis found that while adopting SQBP, researchers focused primarily on rational cost‐and‐benefit analysis, rather than on the fundamental tenet of SQBP that highlights ‘bias’ in users' decision‐making on account of their cognitive limitations that lead to bounded rationality. In addition, some of the key constructs used in SQBP were not properly interpreted or were oversimplified in their operationalization. This research note aims to provide guidance for utilizing and analysing SQBP and its constructs for future IS user resistance/adoption research. Because SQBP provides unique insights into ‘bias’ in human decision‐making in its presentation of bounded rationality, accurate interpretation of its concepts and their investigation can help better understand the different sources of user resistance derived from the status quo bias during new IS and ICT implementation. © 2016 John Wiley & Sons Ltd
    July 29, 2016   doi: 10.1111/isj.12118   open full text
  • Starting open source collaborative innovation: the antecedents of network formation in community source.
    Manlu Liu, Clyde Eiríkur Hull, Yu‐Ting Caisy Hung.
    Information Systems Journal. July 22, 2016
    Specific needs in the area of enterprise applications have led to a new type of collaborative open source innovation development across institution borders: community source. We use the Kuali community source network, a jointly managed, border‐spanning organization that supplies the institutions that created it, to describe how community source works. This study builds a theoretical basis for understanding the individual and institutional factors affecting community source network formation and the decision by organizations to join a community source network. We identify eight antecedents of decisions about forming or joining community source initiatives: motives, learning, trust, norms and monitoring, institutional similarity, external funding, hostile external environment and information technology. © 2016 John Wiley & Sons Ltd
    July 22, 2016   doi: 10.1111/isj.12113   open full text
  • Nothing is more practical than a good conceptual artifact… which may be a theory, framework, model, metaphor, paradigm or perhaps some other abstraction.
    Steven Alter.
    Information Systems Journal. June 13, 2016
    This research commentary proposes a way to make progress in the IS discipline's inconclusive discussion about the nature and role of theory. In some ways, the creation and testing of theory seems to be the primary goal of IS research. Despite that, there are persistent questions whether theory has become a fetish in the IS discipline and whether the routinized production and testing of mid‐range theories is little more than an uninspired script that reduces the value and interest of IS research. This paper reframes the discussion around the idea of ‘conceptual artifact’ that has been discussed widely in educational psychology for over a decade. Conceptual artifacts are abstract knowledge objects that can be produced, tested and improved. This paper recognizes the value of both abstract knowledge (conceptual artifacts) and non‐abstract knowledge. It explains that theorizing produces, evaluates or improves useful conceptual artifacts that may or may not be theories. It validates four premises related to conceptual artifacts by showing that theorizing related to work system theory created or used many different types of conceptual artifacts. It identifies nine criteria for evaluating conceptual artifacts and shows that some of them differ from typical criteria for evaluating Gregor Type IV theories. As a whole, it argues that that privileging theory over other types of conceptual artifacts may not be beneficial in pursuing the research questions that the IS discipline needs to study.
    June 13, 2016   doi: 10.1111/isj.12116   open full text
  • Characteristics of IT artifacts: a systems thinking‐based framework for delineating and theorizing IT artifacts.
    Sabine Matook, Susan A. Brown.
    Information Systems Journal. June 09, 2016
    The information technology artifact (ITA) has been suggested as the core of information systems (IS) research, and the research community has been encouraged to deeply engage with the ITA. Various studies highlight, however, that the ITA continues to receive only limited attention and thus, little foundation exists for IS researchers to delineate and theorize about the ITAs studied. In this paper, we develop a framework that can be utilized as a language for articulating and theorizing the ITA in IS research. Our framework builds on the multi‐faceted theoretical paradigm of systems thinking from which we derive several concepts and appropriate them to the context at hand, resulting in a seven‐dimensional framework of characteristics for ITAs. In a literature survey of research on enterprise systems and enterprise resource planning systems in top IS journals, we show how ITA characteristics are currently included to present details of the relevant ITA instance and identify theoretical relationships between ITA characteristics and outcomes. We conclude the study by demonstrating the use of the ITA framework for delineating and theorizing the ITA in IS research.
    June 09, 2016   doi: 10.1111/isj.12108   open full text
  • The roles of mood and conscientiousness in reporting of self‐committed errors on IT projects.
    Hyung Koo Lee, Mark Keil, H. Jeff Smith, Sumantra Sarkar.
    Information Systems Journal. May 17, 2016
    Over the past two decades, several studies have investigated the factors that lead to and away from individuals' reporting of truthful status information on IT projects. These studies have typically considered the reporting decisions of an individual who is aware of negative status information that is attributed to others' errors. These previous studies have seldom examined the situation in which the individual is considering whether to report information about his or her own self‐committed error on the project. In this study, we consider this largely unexamined phenomenon. In this context, we focus on the influences that different affective states and a personality trait (conscientiousness) can have on error reporting decisions. Specifically, we investigate how different moods (i.e. positive vs. negative) and conscientiousness can influence error reporting decisions in the context of an IT project. Based on the results from a controlled laboratory experiment, we find that individuals in a negative mood are more willing to report their errors compared to individuals in a positive mood. Conscientiousness also positively influences individuals' willingness to report errors, and it also has an indirect effect through cost–benefit differential (i.e. one's perceptions of benefits relative to costs). Additionally, mood is found to moderate the relationship between conscientiousness and willingness to report. We discuss the implication of our findings and directions for future research and for practice. © 2016 John Wiley & Sons Ltd
    May 17, 2016   doi: 10.1111/isj.12111   open full text
  • A reflection on information systems strategizing: the role of power and everyday practices.
    Marco Marabelli, Robert D. Galliers.
    Information Systems Journal. May 17, 2016
    We review the IS strategizing literature and highlight its main strengths and weaknesses. Strengths include an account given to the relevance of tensions between planned and executed strategy, and associated tradeoffs such as rigidity and flexibility, formal and informal strategizing and the exploitation of static resources vis à vis the exploration of novel capabilities. Weaknesses relate to a predominant focus on an organizational level of analysis and a lack of power considerations. In this paper we aim to build on these strengths and to ameliorate these weaknesses by proposing a comprehensive IS strategizing framework that uses extant IS strategizing research as a foundation, rejuvenated by insights from the emerging strategy‐as‐practice literature. The paper extends our understanding of IS strategizing in light of the practice perspective by providing a multilevel account and incorporating power considerations.
    May 17, 2016   doi: 10.1111/isj.12110   open full text
  • Applying a critical approach to investigate barriers to digital inclusion and online social networking among young people with disabilities.
    Lareen Newman, Kathryn Browne‐Yung, Parimala Raghavendra, Denise Wood, Emma Grace.
    Information Systems Journal. April 29, 2016
    Despite the seeming ubiquity of young people's Internet use, there are still many for whom access to the Internet and online social networking remains inequitable and patterned by disadvantage. The connection between information technology and young people with disabilities is particularly under‐researched. This article contributes to the field of critical information systems research by exposing significant barriers and facilitators to Internet accessibility for young people with disabilities. It uses Bourdieu's critical theory to explore how the unequal distribution of resources shapes processes of digital inclusion for young people with disabilities. It highlights access needs and experiences that are both disability and non‐disability related. The article draws on interviews in South Australia with 18 young people aged 10–18 years with a physical disability (such as cerebral palsy) or acquired brain injury and with 17 of their family members. Interviews evaluated participants' and parents' reflections on the benefits of a home‐based, goal‐oriented intervention to increase the young person's Internet use for social participation purposes. The Bourdieuian analysis demonstrated how varying levels of accrued individual and family offline capital resources are related to digital/online resources and disability‐specific online resources. This revealed how unequal resources of capital can influence technology use and hence digital inclusion for young people with disabilities. Our study demonstrates that young people with particular types of disabilities require intensive, personalised and long‐term support from within and beyond the family to ‘get online’. We conclude that Internet studies need to more frequently adopt critical approaches to investigate the needs of users and barriers to information technology use within sub‐groups, such as young people with disabilities. © 2016 John Wiley & Sons Ltd
    April 29, 2016   doi: 10.1111/isj.12106   open full text
  • Designing business models for cloud platforms.
    Andrea Giessmann, Christine Legner.
    Information Systems Journal. April 26, 2016
    Platform as a service (PaaS) has become a strategic option for software vendors who expect to benefit from value co‐creation with partners by developing complementary components and applications. In reality, however, established and new software vendors are battling to redefine their offering to embrace PaaS. They face the challenges of transforming, configuring and calibrating their PaaS business models to align them with existing business models, customer expectations and competitive pressures. This motivates our research question: How can software providers design viable business models for PaaS? Our study develops a design theory for PaaS business models. This theory is grounded on a 12‐month action design research study at one of the largest global software companies (here called Alpha) with mixed PaaS experiences in the past. Our primary research contribution is a set of design principles that guide software providers to define a viable PaaS business model in order to create a flourishing software ecosystem for their cloud platform. By synthesizing prescriptive knowledge related to business model design for emerging cloud platforms, our study advances PaaS research towards the existing body of research on software platforms and business models.
    April 26, 2016   doi: 10.1111/isj.12107   open full text
  • Information systems absorptive capacity for environmentally driven IS‐enabled transformation.
    Vanessa Cooper, Alemayehu Molla.
    Information Systems Journal. April 18, 2016
    The potential of information systems (IS) to enable environmental sustainability necessitates an understanding of how organisations can realise this potential. In this study, building on the absorptive capacity theory and following a multi‐disciplinary and multi‐method approach, we propose that developing IS‐environmental absorptive capacity is a significant mechanism to deliver IS‐enabled change that addresses environmental issues. We commenced with a literature review and exploratory interviews to define the IS‐environmental absorptive capacity construct. We then developed a model that proposes that sustainable IS triggers, knowledge exposure and prior experience influence IS‐environmental absorptive capacity, which in turn contributes to the level of environmentally sustainable IS assimilation as well as to the cost saving, operational performance and reputation of organisations. The model was first tested through an international survey of 148 senior IS managers. The findings support our model regarding the antecedents and value of IS‐environmental absorptive capacity. A follow‐up case study corroborated the survey results and provided additional insights into the nature and causes of IS‐environmental absorptive capacity and its value. This study, in addition to presenting empirical evidence, defines and operationalises the IS‐environmental absorptive capacity construct in a theoretically and operationally meaningful way. © 2016 Blackwell Publishing Ltd
    April 18, 2016   doi: 10.1111/isj.12109   open full text
  • How does business analytics contribute to business value?
    Peter B. Seddon, Dora Constantinidis, Toomas Tamm, Harjot Dod.
    Information Systems Journal. April 14, 2016
    This paper presents a model, synthesized from the literature, of factors that explain how business analytics contributes to business value. It also reports results from a preliminary assessment of that model. The model consists of two parts: a process and a variance model. The process model depicts the analyze‐insight‐decision‐action process through which use of an organization's business analytic capabilities is intended to create business value. The variance model proposes that the five factors in Davenport et al.'s DELTA model of business analytics success factors, six from Watson & Wixom and three from Seddon et al.'s model of organizational benefits from enterprise systems, assist a firm to gain business value from business analytics. A preliminary assessment of the model was conducted using data from 100 customer success stories from vendors such as IBM, SAP and Teradata. Our conclusion is that the business analytics success model is likely to be a useful basis for future research.
    April 14, 2016   doi: 10.1111/isj.12101   open full text
  • Service encounter thinklets: how to empower service agents to put value co‐creation into practice.
    Tobias Giesbrecht, Gerhard Schwabe, Birgit Schenk.
    Information Systems Journal. March 10, 2016
    The concept of value co‐creation and the service encounter as locus of this value co‐creation gained much academic interest, notably in marketing research and service sciences. While the current research discourse mainly follows conceptual perspectives, there has been little research on the practical implications on service agents' enabling co‐creation of value in the information technology (IT)‐supported service encounters with clients. In this paper, we seek to bridge this gap and first use the example of IT‐supported citizen advisory services to show the fundamental deficiencies in current service agents regarding the implementation of value co‐creation work practices. We introduce the concept of service encounter thinklets, adapted from collaboration engineering, to overcome these deficiencies and to empower service agents to put value co‐creation into practice. We show how service encounter thinklets can complement existing advisory support measures to enable service agents to transform the IT‐supported customer service encounter into a collaborative work environment, bringing together themselves, customers and supporting information systems to co‐create the advisory's value. A test with employees in a public administration's front office has provided first evidence that service encounter thinklets can effectively empower service agents on the job to adapt their work practices and to bring value co‐creation into practice.
    March 10, 2016   doi: 10.1111/isj.12099   open full text
  • A typology of user liability to IT addiction.
    Isaac Vaghefi, Liette Lapointe, Camille Boudreau‐Pinsonneault.
    Information Systems Journal. March 02, 2016
    To date, information systems (IS) research mainly has provided a monolithic view of information technology (IT) use, considering it to be a desired behaviour with positive outcomes. However, given the dramatic increase in the use of technology during the last few years, susceptibility to IT addiction is increasingly becoming an important issue for technology users and IS researchers. In this paper, we report the results of a study that focuses on identifying variations in user liability to IT addiction, which reflects the susceptibility of individual users to develop IT addiction. First, a review of the literature in different disciplines (e.g. health, psychology and IS) allows us to better understand the concepts of IT addiction and liability to addiction. The literature review also provides an overview of the antecedents and consequences associated with IT addiction. Then, building on the analysis of 15 in‐depth interviews and 182 exploratory open‐ended surveys collected from smartphone users, we apply the concept of liability to addiction in the IT use context and propose a typological theory of user liability to IT addiction. Our typology reveals five ideal types; each can be associated to a user profile (addict, fanatic, highly engaged, regular and thoughtful). Building upon both the extant literature and our results, we put forth propositions to extend the theoretical contributions of the study. We finally discuss the contributions and implications of our paper for research and practice.
    March 02, 2016   doi: 10.1111/isj.12098   open full text
  • An activity theoretic analysis of the mediating role of information systems in tackling climate change adaptation.
    Helen Hasan, Stephen Smith, Patrick Finnegan.
    Information Systems Journal. February 18, 2016
    This paper demonstrates that information systems (IS) researchers and practitioners can make a significant contribution to the grand challenge of sustainability in light of global climate change. In doing so, the paper takes a novel perspective by going beyond the dominant emphasis in the Green IS literature on climate change mitigation to focus on climate change adaptation. To demonstrate how IS researchers and practitioners can engage with the grand challenge of sustainability, we report the findings of an investigation into the role of IS in climate change adaptation programmes of the government of New South Wales, Australia. Canonical action research, informed by activity theory, proved to be an appropriate methodology for this investigation by combining iterative collaborative engagement and rigorous scholarly reflection. Activity theory has previously been successfully used in IS research as a framework for inquiry and description but not for prediction. This raised questions, addressed in this study, about whether or not activity theory could be used to guide interventions and make sense of their impact. The findings reveal how activity theory provides an appropriate balance between scope and detail to accommodate the complex processes of planning and implementing climate change adaptation programmes. We conclude that while climate adaptation is complex, activity theory, specifically five dynamic dimensions for deep sense‐making, can inform interventions in climate change adaptation projects. Most significantly, we demonstrate that IS experts can make a positive contribution to addressing one of the most important grand challenges of our time.
    February 18, 2016   doi: 10.1111/isj.12104   open full text
  • Affordances of social media in collective action: the case of Free Lunch for Children in China.
    Yingqin Zheng, Ai Yu.
    Information Systems Journal. January 26, 2016
    This paper studies the socialised affordances of social media in the processes of collective action, exploring the role of technology in the under‐researched area of civil society. We examine the case of Free Lunch for Children (FL4C), a charitable programme in China based on the microblogging platform, Weibo. Adopting the perspective of affordances‐for‐practice, we draw upon the collective action model to better understand the sociomaterial practices and social processes involving social media, and seek to address the ‘when’ and ‘how’ questions of affordances. The study generates theoretical and practical implications for understanding the role of social media in social transformation.
    January 26, 2016   doi: 10.1111/isj.12096   open full text
  • Developing ecological sustainability: a green IS response model.
    Jonas Hedman, Stefan Henningsson.
    Information Systems Journal. January 20, 2016
    Growing private and public concern with the environment is pushing businesses to increase their awareness and action. Using the Nordic bank Nordea as a case study and a Green information systems (IS) organizational response model developed on the basis of extant literature, we investigate how Green IS initiatives become part of a firm's overall strategy and part of the organizational sustainability process. We find that Green IS initiatives are initiated through a bottom‐up process where environmentally concerned individuals identify issues and become Green IS champions. They use their authority and edification skills to promote Green IS to the organizational agenda. If the issue is aligned with the organizational agenda, it receives management's endorsement. The empirical case also shows two types of systemic feedback that can fuel a self‐reinforcing sustainability process. The first type of feedback increases the champion's ability to promote Green IS in the future through authority and edification. The second type leads to the transformation of organizational value through reinforcement and extension. Finally, we identify interrelationships between organizational response processes, where higher‐order response processes, e.g. change of corporate values, function as gatekeepers or pre‐conditions for when and which issues are promoted to the organizational agenda. © 2016 Wiley Publishing Ltd
    January 20, 2016   doi: 10.1111/isj.12095   open full text
  • Applying configurational analysis to IS behavioural research: a methodological alternative for modelling combinatorial complexities.
    Yong Liu, József Mezei, Vassilis Kostakos, Hongxiu Li.
    Information Systems Journal. December 01, 2015
    An important limitation of regression‐based analysis stems from the assumption of symmetric relationships between variables, which is often violated. To overcome this limitation within IS research, we propose the use of the fuzzy‐set qualitative comparative analysis (FsQCA) method. The paper elaborates on the rationale for applying this approach to IS behavioural research and how to tailor FsQCA for this purpose. A systematic interpretation of the technique covering its mathematical properties and advanced features is provided. Drawing from an illustrative study of mobile government services adoption by residents of rural areas, the paper demonstrates FsQCA's potential to supplement regression‐based IS behavioural research, by (i) examining asymmetric relationships between a set of antecedents and the IS phenomenon of interest, (ii) providing nuanced coverage of necessary and sufficient conditions for emergence of an IS behavioural outcome, and (iii) identifying various configurations of conditions in association with users' demographic characteristics. © 2015 Blackwell Publishing Ltd
    December 01, 2015   doi: 10.1111/isj.12094   open full text
  • Solving misfits in ERP implementations by SMEs.
    Joost A. A. Beijsterveld, Willem J. H. Groenendaal.
    Information Systems Journal. September 28, 2015
    The gap between the organizational needs and the extent to which an ‘off‐the‐shelf’ enterprise resource planning (ERP) system can meet these is called a misfit. A framework is developed to distinguish actual from perceived misfits. This is used to analyse the ERP implementation at four small‐sized and medium‐sized enterprises. The results show that they prefer to adjust the ERP system to their business processes when needed but often unnecessarily change the system to solve perceived misfits. The framework is a first step to prevent this unnecessary work in the future.
    September 28, 2015   doi: 10.1111/isj.12090   open full text
  • Can the outside‐view approach improve planning decisions in software development projects?
    Ofira Shmueli, Nava Pliskin, Lior Fink.
    Information Systems Journal. September 28, 2015
    This study empirically tackles the question of whether taking an outside‐view approach, recommended for reducing the irrational behaviours associated with the planning fallacy, can also reduce the time underestimation, scope overload and over‐requirement problems plaguing planning decisions in software development. Drawing on descriptive behavioural decision theory, this study examines whether the planning fallacy, a cognitive bias referring to the tendency of people to underestimate costs and overestimate benefits in evaluating a task to be performed, can provide a theoretical platform for mitigating irrational behaviours in the planning of software development projects. In particular, we argue that taking an outside‐view approach in planning decisions for software development may have the same mitigating effects on time underestimation, scope overload and over‐requirement it has been shown to have on cost underestimation and benefit overestimation. In an experiment investigating this argument, participants were randomly assigned to four groups by manipulating two outside‐view mechanisms: reference information about past completion times (present/absent) and role perspective (developer/consultant). After being presented with a to‐be‐developed software project, they were requested to estimate development times of various software features and to recommend which features to include within project scope given a fixed duration for the entire project. The results confirm that the three problems of time underestimation, scope overload and over‐requirement are manifested in planning decisions for fixed‐schedule software development projects. Moreover, the results show that these problems are mitigated, yet not eliminated, by presenting reference information about past completion times and by having a consultant role.
    September 28, 2015   doi: 10.1111/isj.12091   open full text
  • Career transition antecedents in the information technology area.
    Luiz Antonio Joia, Ursula Mangia.
    Information Systems Journal. September 11, 2015
    The more organizations invest in information technology (IT), the more the concern with IT personnel management has increased, namely the hiring, training and retaining of IT professionals needed to deal with such investments. In this context, two issues related to these professionals have often been observed, namely ‘turnover’ – in which the IT professional changes job but still remains in the IT area – and ‘turnaway’ – in which the IT professional abandons the IT area and assumes a job in another area in the same organization or another, usually rising to a managerial position. This work addresses the turnaway of IT professionals in Brazil. The relevance of this research is supported by the shortage of adequately trained IT professionals to work in the productive sector in this country. Therefore, by using and adapting the extant scientific literature, research hypotheses associated with the IT professional turnaway phenomenon are developed and tested via structural equation modelling. It was then concluded that exhaustion with work in the IT area, job dissatisfaction, the need to acquire further experience to remain attractive in the job market, the need for professional growth and prior and conscious managerial capacity development for career transition are the main antecedents of the career transition of IT professionals to other functional areas.
    September 11, 2015   doi: 10.1111/isj.12087   open full text
  • Cultures of participation—for students, by students.
    Fay Cobb Payton.
    Information Systems Journal. August 14, 2015
    Culturally relevant health information is said to benefit diverse populations and is critical for health dissemination and user experience creation. Social media and online content provide mechanisms to engage specific populations while helping to reduce barriers that can often hinder participation and engagement. Using action research and informed by co‐creation theory, the MyHealthImpactNetwork.org initiative seeks to provide a user experience targeting Black female college students. Data were collected from females at a large university located in the Southeast United States. Through focus group participants' feedback, co‐creation with students as design delegates and reviews of social media resentments, MyHealthImpactNetwork.org evolved to include user‐driven content. Results indicate that Black females are interested in HIV prevention information that uses simple, non‐technical health jargon. The information should be, however, socially engaging to enable their voices to be heard, absent of cultural assumptions and biases about Black women, and embody an ownership ethos relative to social content. Informed by principals of canonical action research and the co‐creation that results between the researcher and potential user, these findings suggest that the hedonic dimension underpins the key design lessons. This research helps to fill a void in the literature regarding the creation of user experiences for health‐related messages, particularly those regarding stigmatized conditions, such as HIV, while designing for cultures of participation among under‐represented groups.
    August 14, 2015   doi: 10.1111/isj.12086   open full text
  • User behaviours after critical mobile application incidents: the relationship with situational context.
    Markus Salo, Lauri Frank.
    Information Systems Journal. June 10, 2015
    Users occasionally have critical incidents with information systems (IS). A critical IS incident is an IS product or service experience that a user considers to be unusually positive or negative. Critical IS incidents are highly influential in terms of users' overall perceptions and customer relationships; thus, they are crucial for IS product and service providers. Therefore, it is important to study user behaviours after such incidents. Within IS, the relationships between the situational context and user behaviours after critical incidents have not been addressed at all. Prior studies on general mobile use as a related research area have recognized the influence of the situational context, but they have not covered the relationships between specific situational characteristics and different types of user behaviours. To address this gap, we examine 605 critical mobile incidents that were collected from actual mobile application users. Based on our results, we extend current theoretical knowledge by uncovering and explaining the relationships between specific situational characteristics (interaction state, place, sociality and application type) and user behaviours (use continuance, word‐of‐mouth and complaints). We have found, for example, that users are less likely to engage in negative behaviours after negative incidents that take place outdoors or in vehicles than after indoor incidents. This is because users often consider indoor environments to be familiar and treat them with established expectations and low uncertainty: users are accustomed to the notion that the applications function indoors just like before. Further, we present practical implications for mobile application providers by suggesting to them which positive critical incidents are the most beneficial to promote and which negative critical incidents are the most crucial to avoid.
    June 10, 2015   doi: 10.1111/isj.12081   open full text
  • Understanding buyers' loyalty to a C2C platform: the roles of social capital, satisfaction and perceived effectiveness of e‐commerce institutional mechanisms.
    Qian Huang, Xiayu Chen, Carol Xiaojuan Ou, Robert M. Davison, Zhongsheng Hua.
    Information Systems Journal. June 05, 2015
    Drawing upon social capital theory, this study aims to investigate how different dimensions of social capital affect online buyers' satisfaction and ultimately boost their loyalty to a Consumer‐to‐Consumer (C2C) platform. Specifically, we propose that three dimensions of social capital (i.e., cognitive, structural and relational capital) contribute positively to the two types of online buyers' satisfaction (i.e., economic and social satisfaction). In addition, we posit that perceived effectiveness of e‐commerce institutional mechanisms (PEEIM) moderates the relationships between economic and social satisfaction and buyers' loyalty to the platform. Three hundred buyers on the Consumer‐to‐Consumer platform, TaoBao, were surveyed to test the proposed model. The results suggest that buyers' evaluation of social capital with the community of sellers can enhance their satisfaction with the sellers, which subsequently affect their loyalty to the platform. Furthermore, perceived effectiveness of e‐commerce institutional mechanisms negatively moderates the effect of economic satisfaction and positively moderates the effect of social satisfaction on buyers' loyalty to the platform. The theoretical contributions and practical implications are discussed.
    June 05, 2015   doi: 10.1111/isj.12079   open full text
  • Internet aggression in online communities: a contemporary deterrence perspective.
    Bo Xu, Zhengchuan Xu, Dahui Li.
    Information Systems Journal. May 28, 2015
    Internet users' activities are critical to the development and success of Web 2.0 systems, such as online communities. Within the community's participation, knowledge sharing, and communications, users may conduct aggressive behaviors that would have a negative impact on that online community. This study investigates factors that affect Chinese users' aggression intention in online communities. Research findings show that online aggression can be inhibited by internal deterrents of face saving and moral beliefs, which may be enhanced through implementation of consequences from an effective community policy and peer pressure among community members. Differences in the effects of the deterrence measures exist between younger and older users. This paper contributes theoretically and empirically to Web 2.0 research and has practical implications for virtual community management.
    May 28, 2015   doi: 10.1111/isj.12077   open full text
  • Reconciling global and local needs: a canonical action research project to deal with workarounds.
    Julien Malaurent, David Avison.
    Information Systems Journal. May 26, 2015
    This paper discusses how research with practitioners can help reconcile the top‐down requirements of headquarters with the bottom‐up local needs in the context of global information systems. Based on a 12‐month canonical action research project that took place at the Chinese branches of a French multinational corporation, our research revealed and addressed workarounds that the Chinese users of a company‐wide global enterprise resource planning system had put in place that were not expected nor desired by company headquarters. From the local users' point of view, they were necessary to deal with Chinese legislation and cultural practices, but from the French headquarters' point of view, they meant that many of the potential gains of global standards were lost. Activity theory was used as a focal theory to analyse each of these workarounds and business process management as an instrumental theory to design solutions to the workarounds. We describe in detail how we used canonical action research to successfully deal with exemplars of each of the three types of workaround identified (data adjustments, process adjustments and parallel‐system adjustments). Unusually, the research relates to post‐implementation change rather than to that looking at change occurring before and during implementation. We argue that canonical action research and the particular combination of activity theory and business process management are appropriate for dealing with workarounds and this has not been demonstrated previously. Further, our research – deemed successful by managers, users and researchers alike – took place in China where previous literature suggests only limited success with such global systems.
    May 26, 2015   doi: 10.1111/isj.12074   open full text
  • Winner's regret in online C2C Auctions: an automatic thinking perspective.
    Sang Cheol Park, Mark Keil, Gee‐Woo Bock, Jong Uk Kim.
    Information Systems Journal. May 26, 2015
    While human beings embody a unique ability for planned behaviour, they also often act automatically. In this study, we draw on the automatic thinking perspective as a meta‐theoretic lens to explain why online auction bidders succumb to both trait impulsiveness and sunk cost, ultimately leading them to experience winner's regret. Based on a survey of 301 online auction participants, we demonstrate that both trait impulsiveness as an emotional trigger and sunk cost as a cognitive trigger promote winner's regret. By grounding our research model in the automatic thinking view, we provide an alternative meta‐theoretical lens from which to view online bidder behaviour, thus bolstering our current understanding of winner's regret. We also investigate the moderating effects of competition intensity on the relationships between the triggers of automatic thinking and winner's regret. Our results show that both trait impulsiveness and sunk cost have significant impacts on winner's regret. We also found that the relationship between these two triggers and winner's regret is moderated by competition intensity.
    May 26, 2015   doi: 10.1111/isj.12075   open full text
  • Theorising about gender and computing interventions through an evaluation framework.
    Annemieke Craig.
    Information Systems Journal. April 30, 2015
    Despite over 20 years of intervention programmes, the gender balance in the computing profession is not improving. It has been suggested that the problem with much of the research on gender and computing is that it is under‐theorised. The contribution of this study is an evaluation framework, designed to evaluate gender and computing interventions, which will advance the theorisation of research through programme evaluation. This study was undertaken in three phases: The first involved theory building through an extensive review of the literature resulting in a conceptual framework for intervention programme evaluation. The second phase consisted of a multiple‐case study of 14 major intervention programmes in Australia. Subsequent modifications to the conceptual framework resulted in the gender and computing intervention evaluation framework. The value of the framework was confirmed in phase three by intervention experts and showed that applying the framework will help programme champions to evaluate their programmes more thoroughly. The dissemination of sound evaluation results will then enable a deeper theorisation of the issues surrounding gender and computing interventions.
    April 30, 2015   doi: 10.1111/isj.12072   open full text
  • Towards an understanding of the role of business intelligence systems in organisational knowing.
    Arisa Shollo, Robert D. Galliers.
    Information Systems Journal. April 21, 2015
    Recent advances in information technology (IT), such as the advent of business intelligence (BI) systems, have increased the ability of organisations to collect and analyse data to support decisions. There is little focus to date, however, on how BI systems might play a role in organisational knowledge creation – in organisational knowing. We develop a conceptual framework of organisational knowing based on a synthesis of the literature, and use this as a framework to investigate how BI systems facilitate knowing in a case organisation. We identify two practices triggered by BI systems that distinguish them from prior applications of IT: the ability to initiate problem articulation and dialogue, and that of data selection (e.g. to address information needs of organisational decision makers at different managerial levels). This study provides empirical evidence of the performative outcome of BI systems in relation to organisational knowing through the practices of articulation and data selection. It provides a practice perspective on BI and focuses on the role of BI systems in organisational knowing thereby opening up a new departure for BI research that considers the implications of BI systems in organisations with actual practice in mind.
    April 21, 2015   doi: 10.1111/isj.12071   open full text
  • Hitting a moving target: a process model of information systems control change.
    W. Alec Cram, M. Kathryn Brohman, R. Brent Gallupe.
    Information Systems Journal. February 10, 2015
    Controls are widely regarded as a key factor in driving high performing organisational processes. However, because of ongoing changes within information systems (IS) processes, control modifications are commonly required in order to maintain performance levels. Although past research recognises the ongoing benefits derived from successful control changes, there is a limited understanding of the actual steps taken by organisations, particularly with regard to avoiding negative performance implications such as process delays or employee resistance. This research draws on empirical data from six case studies to propose a new process model that depicts the interconnected steps involved in control changes. Our findings suggest that the sources of IS control change may be more diverse than most past research suggests and that control changes within non‐project‐oriented processes (e.g. enterprise architecture) present additional challenges in comparison to project‐oriented processes (e.g. systems development). Insights from this research can aid practitioners in streamlining control changes as a means to improve effectiveness, whilst also contributing to research by uncovering an enhanced understanding of why and how control changes are made in IS processes.
    February 10, 2015   doi: 10.1111/isj.12059   open full text
  • Persistent problems and practices in information systems development: a study of mobile applications development and distribution.
    Birgitta Bergvall‐Kåreborn, Debra Howcroft.
    Information Systems Journal. March 27, 2014
    The widespread uptake of mobile technologies has witnessed a re‐structuring of the mobile market with major shifts in the predominance of particular firms and the emergence of new business models. These sociotechnical trends are significant in the ways that they are influencing and shaping the working lives of software professionals. Building on prior research investigating the persistent problems and practices of systems development, this paper examines mobile applications development and distribution. A qualitative study of 60 developers based in Sweden, the UK and the USA was analysed around the interrelated problems of diversity, knowledge and structure. The analysis revealed how platform‐based development in an evolving mobile market represents significant changes at the business environment level. These changes ripple through and accentuate ongoing trends and developments, intensifying the persistent problems and challenges facing software developers.
    March 27, 2014   doi: 10.1111/isj.12036   open full text
  • Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance.
    Han Li, Rathindra Sarathy, Jie Zhang, Xin Luo.
    Information Systems Journal. March 27, 2014
    Internet security risks, the leading security threats confronting today's organizations, often result from employees' non‐compliance with the internet use policy (IUP). Extant studies on compliance with security policies have largely ignored the impact of intrinsic motivation on employees' compliance intention. This paper proposes a theoretical model that integrates an intrinsic self‐regulatory approach with an extrinsic sanction‐based command‐and‐control approach to examine employees' IUP compliance intention. The self‐regulatory approach centers on the effect of organizational justice and personal ethical objections against internet abuses. The results of this study suggest that the self‐regulatory approach is more effective than the sanction‐based command‐and‐control approach. Based on the self‐regulatory approach, organizational justice not only influences IUP compliance intention directly but also indirectly through fostering ethical objections against internet abuses. This research provides empirical evidence of two additional effective levers for enhancing security policy compliance: organizational justice and personal ethics.
    March 27, 2014   doi: 10.1111/isj.12037   open full text
  • How do industry‐wide information infrastructures emerge? A life cycle approach.
    Kai Reimers, Mingzhi Li, Bin Xie, Xunhua Guo.
    Information Systems Journal. March 07, 2014
    Industry‐wide information infrastructures (IIIS) have recently gained increased attention by policy makers, especially in the healthcare sector where it is believed that IIIS can substantially contribute to the taming of exploding healthcare costs and dramatically improve service quality, e.g., by avoiding widespread medication errors. However, the emergence and evolution of IIIS is as yet poorly understood, partly because the information systems (IS) literature traditionally uses much smaller units of analysis such as projects, organizations or small networks of organization. In this paper, we propose a combined company‐level and industry‐level framework to shed light on the process of IIIS emergence. We demonstrate, for the first time, that IIIS emergence is intricately linked to the industry life cycle for the case of fragmented industries. We also explore the relationship between the industry‐level and company‐level life cycles in the process of IIIS emergence, and develop a novel proposition regarding this relationship. Our findings suggest that current policy initiatives to promote the development of IIIS have not adequately taken industry‐level conditions into consideration.
    March 07, 2014   doi: 10.1111/isj.12034   open full text
  • Educating reflective Enterprise Systems practitioners: a design research study of the iterative building of a teaching framework.
    Eli Hustad, Dag H. Olsen.
    Information Systems Journal. December 17, 2013
    This research paper reports on the iterative design of a teaching framework developed for teaching Enterprise Systems (ES) classes for Information Systems (IS) graduates. These systems embed technical complexity and create organizational challenges when implemented in organizations. Therefore, teaching good ES classes is pedagogically challenging for faculty, and ES curricula are difficult for students. We have gradually designed and rebuilt curricula and teaching frameworks over 8 years. This has also resulted in a set of eight design principles. We report from our design and evaluation process and present our final artefact, the teaching framework. The aim is to educate reflective practitioners with multiple ES skills, enabling them to tackle the complexities of ES implementation contexts. The framework has implications for IS educational research and practice and has some generic values that are transferable to other academic institutions and adaptable to other IS learning environments. Further, the study contributes to IS design research by extending its application area. The ES teaching framework is a specific contribution to IS teaching frameworks as a class of problems.
    December 17, 2013   doi: 10.1111/isj.12032   open full text
  • What a smartphone is to me: understanding user values in using smartphones.
    Yoonhyuk Jung.
    Information Systems Journal. November 22, 2013
    The objective of this study is twofold. First, it aims to investigate the various values users achieve with smartphones, which is a form of user‐empowering information technology (IT). The other objective is to introduce a means‐end chain approach into IT‐user studies. An important attraction of smartphones is their personalized environment, which is mainly provided by varied applications. The user personalization ability implies that users achieve diverse benefits with smartphones; that is, users decide what a smartphone is to them rather than adopt a given product. Thus, investigating what values users pursue with a smartphone (i.e. a value‐oriented approach) will give insights into understanding the users. To investigate user values in using smartphones, we conducted a laddering interview with 54 smartphone users and analyzed the data by using a means‐end chain approach to understand consumers' hierarchical value structure. This study contributes to value‐oriented research on user‐empowering IT by revelling how users benefit from smartphones. Furthermore, the study advances value‐oriented research by showing what users actually do with smartphones, from concrete activities to abstract values. In addition, a means‐end chain approach introduced in the study can be another angle for the investigation of user adoption of technology, in that it can describe IT use contexts and practices, which become an important object of analysis in the information systems research.
    November 22, 2013   doi: 10.1111/isj.12031   open full text
  • The push, pull and mooring effects in virtual migration for social networking sites.
    I‐Cheng Chang, Chuang‐Chun Liu, Kuanchin Chen.
    Information Systems Journal. November 21, 2013
    Social networking sites (SNSs) have become increasingly common in recent years, and their use has become integrated into the daily lives of millions of people across the world. Attracting new users and retaining existing ones are critical to the success of SNS providers. This study applies the push‐pull‐mooring model of the migration theory to improve our understanding of factors that influence the switching behavior of SNS users. Following the migration theory, this study empirically examines the three categories of antecedents for SNS switching intention: push (i.e., dissatisfaction and regret), pull (i.e., alternative attractiveness), and mooring (i.e., switching costs) factors. The results show that the three categories of factors had varying degrees of effects on switching intention. Additionally, the strong moderation effects of both pull and mooring factors help answer the question why switching does not necessarily occur when push factors are in effect. Managerial implications are provided.
    November 21, 2013   doi: 10.1111/isj.12030   open full text
  • Knowledge transfer in IT offshoring relationships: the roles of social capital, efficacy and outcome expectations.
    Angelika Zimmermann, M. N. Ravishankar.
    Information Systems Journal. July 19, 2013
    Information technology (IT) development in global organisations relies heavily on the transfer of tacit and complex knowledge from onshore units to offshore subsidiaries. A central concern of such organisations is the development of social capital, which is known to facilitate the smooth transfer of knowledge. However, only a few studies in IS research have explicitly examined the role of social capital for knowledge transfer in an IT offshoring context. In this paper, we argue that such knowledge transfer mechanisms can be understood better by considering social capital in concert with knowledge senders' efficacy and outcome expectations, two of the potentially key motivational drivers of knowledge transfer. We develop our arguments through a qualitative case study of a large German multinational company. German IT developers in this firm provided in‐depth accounts of their experience with offshore colleagues in an Indian captive subsidiary unit. Drawing on our analysis, we develop a model that depicts the influence of social capital, efficacy and outcome expectations on onshore IT developers' ability and willingness to transfer knowledge to offshore colleagues. Through the model, we also explain how social capital, efficacy and outcome expectations are interrelated and generate three interlocked, self‐reinforcing circles of knowledge transfer success in IT offshoring relationships.
    July 19, 2013   doi: 10.1111/isj.12027   open full text
  • Digitally enabling social networks: resolving IT–culture conflict.
    Hope Koch, Dorothy E. Leidner, Ester S. Gonzalez.
    Information Systems Journal. June 28, 2013
    Digitally enabled social networks, encompassing social media applications such as wikis, blogs and social networking sites, have the potential to dramatically change organizational culture by building communities, promoting information sharing and fostering collaboration. Although organizational social media site (hereinafter SMS) implementations are proliferating, these technologies often do not harmoniously combine with traditional organizational cultures. To shed light on social media's impact on organizational life, this paper draws on an interpretive case study to investigate a global security company's efforts to implement a digitally enabled social network as part of a cultural change effort. Conceptually, based on the theory of IT–culture conflict, this paper underscores the interplay between organizational culture and technology. Our study finds that conflicts can arise between employees' workplace values and the values they ascribe to social media. This can result in an IT–culture system conflict, which organizations can address using policy‐based, socialization‐based and leadership‐based mechanisms aimed at bringing cultural values and social media site values into alignment.
    June 28, 2013   doi: 10.1111/isj.12020   open full text
  • Communicative genres as organising structures in online communities – of team players and storytellers.
    Christine Moser, Dale Ganley, Peter Groenewegen.
    Information Systems Journal. May 31, 2013
    In this paper, we examine the question of how participants in online communities enact organising structures. We conduct an empirical study based on interpretative and quantitative data and analysis, and argue that communicative genres fulfil the role of intangible organising structures in online communities. These structures are important in the absence of more formal or tangible structures. Furthermore, we take into account participants' position in the social network and find that distinct participant clusters use communicative genres quite differently. In particular, we distinguish four participant clusters using distinct genre repertoires: team players, who make short, advising messages; storytellers, who post less but longer and very social messages; utility posters, who share knowledge but neglect social interaction; and all‐round talents, who engage in various actions and have average messages, without blinking out in any activity. With this research, we provide an analytical tool that allows practitioners to assess community activities, and inform and evaluate strategies for change toward improved outcomes.
    May 31, 2013   doi: 10.1111/isj.12022   open full text
  • Knowledge sharing using IT service management tools: conflicting discourses and incompatible practices.
    Clive R. Trusson, Neil F. Doherty, Donald Hislop.
    Information Systems Journal. May 31, 2013
    ICT applications that include functionality for knowledge sharing are routinely used by IT service providers even though their implementation is known to be problematic and the reasons for such problems not well understood. To shed light on the issue, we collected data at two organisations where managers had provided IT service support workers with IT service management (ITSM) tools incorporating functionality for knowledge sharing. Using critical discourse analysis and rhetorical analysis techniques, we contrasted primary data representative of IT service support practice with other primary and publicly available secondary data reflecting the prevailing discourse of IT service managers. Through this analysis, we identify an apparent dissonance between ITSM managerial and worker discourses that reflect opposing epistemologies. Managers are optimistic about the benefits of ICT‐based knowledge sharing, whereas the practice of workers is revealed to privilege self‐reliance and interpersonal knowledge sharing. By taking a dual, management–worker, perspective, we provide fresh insight into why ICT‐based knowledge sharing is problematic. As a theoretical contribution, we propose that dysfunctional intra‐organisational conflict can arise where incompatible management and worker practices become institutionalised through the simultaneous diffusion of conflicting discourses.
    May 31, 2013   doi: 10.1111/isj.12025   open full text
  • Towards an ecological account of media choice: a case study on pluralistic reasoning while choosing email.
    Yusun Jung, Kalle Lyytinen.
    Information Systems Journal. May 29, 2013
    The discourse around media choice has generated a diverse array of media choice factors originating from both the media‐based and social interaction‐based approaches. The multitude of these factors hints at the adaptive nature of media choice. Alas, how a user engages with such factors and adaptively carries out media choice has remained understudied. We undertake a field study to explore the role of a plurality of choice factors and their interactions in shaping media choice processes and outcomes. In particular, we focus on how a user identifies relationships among plural choice factors while he or she works on his or her particular choice resulting in a similar outcome – email – given a large number of alternatives. Drawing upon a theory of affordances, we propose a systemic way of narrating the dynamics of media choice as a multi‐dimensional process where a user explores her or his surroundings – a niche – as to establish media affordances that will then help her or him achieve a communication goal. We identify five relational patterns of interactions among specific choice factors: reciprocity, emergence, complementarity, re‐exploration and actualisation. These patterns are shown to be emergent and highly interdependent. We conclude by reviewing future research avenues to formulate richer ‘ecological’ accounts of media choice.
    May 29, 2013   doi: 10.1111/isj.12024   open full text
  • Member engagement within digitally enabled social network communities: new methodological considerations.
    Matt Germonprez, Dirk S. Hovorka.
    Information Systems Journal. May 10, 2013
    Digitally enabled social networks (DESN) are a complex assemblage of engagement, reflection, action, technology, organization and community. DESN create a unique challenge for researchers who aim to understand what social networks are, what they can become and what enablers and constraints underlie trajectories of member engagement. As DESN continually evolve, knowing them as stable and reified representations or as mere technology artefacts provides a limited understanding of their complexity and emergent properties. While DESN are, in part, the technology that supports the necessary actions for engagement, they are also the people and behaviours that constitute its community. Through the presentation of new methodological considerations towards Digg, a large DESN, we observe that social networks entail practices of engagement, change and evolution within a DESN community. We reveal how engagement is a communal endeavour and that the clash of socio‐technical trajectories can result in the emergence of new paths of member participation. Our findings demonstrate the potential of netnography and impressionist tales for contributing to the ongoing pluralistic investigations of DESN and also inform research on engagement and community design and change.
    May 10, 2013   doi: 10.1111/isj.12021   open full text
  • Exploring social network interactions in enterprise systems: the role of virtual co‐presence.
    Niran Subramaniam, Joe Nandhakumar, João Baptista (John).
    Information Systems Journal. May 06, 2013
    This paper investigates the impact of social media interactions on the use context of enterprise systems (ES) at a global telecommunications company based in Europe. We conducted a detailed field study of users in three countries who execute tasks collectively using social media capabilities within their ES. The findings provide rich insights into these social media interactions, their influence on ES users' sense of ‘presence’ and their impact on the completion of tasks. Our key research contribution is to introduce the idea of ‘virtual co‐presence’ as a means of understanding the digitally mediated presence of ES users. In addition, we demonstrate how virtual co‐presence and the relationships afforded by social media shape ES users' interactions and collective completion of tasks in a dispersed work context. Drawing on the insights gained from the effect of virtual co‐presence on ES users, the paper outlines some implications for the theory and practice of collective work in ES use.
    May 06, 2013   doi: 10.1111/isj.12019   open full text
  • Understanding e‐Government portal use in rural India: role of demographic and personality characteristics.
    Viswanath Venkatesh, Tracy Ann Sykes, Srinivasan Venkatraman.
    Information Systems Journal. April 25, 2013
    Electronic government (e‐Government) is one of the most important ways to bridge the digital divide in developing countries. We develop a model of e‐Government portal use. We use various individual characteristics, namely demographics and personality, as predictors of e‐Government portal use. Specifically, our predictors were (1) gender, age, income and education; (2) the Big Five personality characteristics, i.e. extraversion, neuroticism, conscientiousness, agreeableness and openness to experience; and (3) personal innovativeness with information technology. We conducted a field study in a village in India. We collected data from over 300 heads of household. We found support for our model, with most variables being significant and explaining 40% of the variance in e‐Government portal use.
    April 25, 2013   doi: 10.1111/isj.12008   open full text
  • Social IT outsourcing and development: theorising the linkage.
    Shirin Madon, Sandesh Sharanappa.
    Information Systems Journal. March 27, 2013
    In recent years, a growing number of social enterprises have focused their attention on harnessing the benefits of trade in software by involving underprivileged communities from developing countries in the production of information technology (IT). The goal of this type of activity, known as social IT outsourcing, is not only to provide employment and income to low‐income individuals but also to address wider development priorities within the locality. This paper focuses on strengthening our understanding of social IT outsourcing as a promoter of development. Based on research in Jharkhand, eastern India, we seek to understand how social IT outsourcing activity is interpreted from the perspective of employees who provide data services for the market and from the perspective of the social enterprise that balances its market orientation with its social development goals. Our findings generate new insights into the mechanisms at play through which social IT outsourcing is able to provide a variety of developmental advantages to rural poor communities leading to policy implications for governments and development agencies.
    March 27, 2013   doi: 10.1111/isj.12013   open full text
  • Self‐efficacy, learning method appropriation and software skills acquisition in learner‐controlled CSSTS environments.
    Andrew M. Hardin, Clayton A. Looney, Mark A. Fuller.
    Information Systems Journal. March 19, 2013
    A computer‐simulated software training system (CSSTS) delivers a specific form of computer‐based training in which participants are allowed to select various training features within a simulated software environment. Given the growing use of these systems as end‐user training (EUT) aids, there is a need for greater understanding of how participants use these systems, as well as whether participant‐controlled learning environments are truly effective. The present research examines how a particular learner characteristic, software self‐efficacy, drives appropriation in a high learner control, CSSTS environment. Contrary to notions in the literature, results from spreadsheet and database software training courses reveal that pre‐training specific software self‐efficacy constitutes a significant, negative predictor of faithful appropriations of the CSSTS. This research also establishes a positive relationship between faithful appropriation and increases in software self‐efficacy (SSE). In essence, faithful appropriations lead to greater increases in SSE, which influences software skills performance. In addition, the research validates prior EUT research by extending prior findings to a database training environment. A psychometrically sound measure is put forth to capture database self‐efficacy.
    March 19, 2013   doi: 10.1111/isj.12016   open full text
  • Structuration bridging diffusion of innovations and gender relations theories: a case of paradigmatic pluralism in IS research.
    Marlei Pozzebon, Dale Mackrell, Susan Nielsen.
    Information Systems Journal. November 22, 2012
    This paper discusses the adoption of a pluralist theoretical framework – one that is also multiparadigmatic – for conducting and publishing information system (IS) research. The discussion is illustrated by a single case study involving the Australian cotton industry. The theoretical framework is informed by three sociological theories, each with its particular paradigmatic assumptions: structuration theory as a meta‐theory, and diffusion of innovations and gender relations as lower‐level theories from notionally opposing paradigms. Theoretical pluralism helped to produce rich findings, illuminating both the social nature of women farmers' roles, the materiality of the cotton farming context, the characteristics of the decision support systems in use and the recursive way in which human agency and institutional pressures shape each other. Because users of so‐called divergent paradigms often face criticism based on the incommensurability issue, one of the main contributions of this paper is to discuss the value of a pluralist and multiparadigmatic theoretical framework in dealing with complex IS social phenomena.
    November 22, 2012   doi: 10.1111/isj.12007   open full text
  • Implications of dominant technological frames over a longitudinal period.
    Karin Olesen.
    Information Systems Journal. November 08, 2012
    Successful adoption and use of information systems is an area of continued research in the field of information systems. This prior research has shown that how we adopt and use an information system depends on how we make sense of it. The sense‐making activity is carried out through our cognitive structures of knowledge that relate to technology (our technological frames). The sense‐making activity changes over time, as use and exposure to differing technologies occur. Most research into information systems in organisations has focused on a specific information system; this preoccupation with studying discrete projects at one point in time may be limiting. In an attempt to fill this research gap, we use the socio‐cognitive perspective of Orlikowski & Gash to analyse technological frames in one organisation over a longitudinal period to evaluate sensemaking in relation to multiple systems. The interpretive case study looks at the technological frames of senior management, faculty teaching staff, information technology (IT) mediating staff and IT groups over a 10‐year period in a university and finds that there were incongruent frames between senior management and other groups within the organisation with senior management holding a dominant frame. The consequences of these frames were demonstrated when they were linked to the use of the four major information systems in the organisation, showing repeated historical patterns of use that caused inefficiencies due to the incongruent frames of the various groups. The unchanging dominant technological frame contributed to this pattern.
    November 08, 2012   doi: 10.1111/isj.12006   open full text
  • Time‐out/time‐in: the dynamics of everyday experiential computing devices.
    Mads Bødker, Gregory Gimpel, Jonas Hedman.
    Information Systems Journal. October 22, 2012
    In everyday life, the role of computing devices alternates between the ordinary and mundane, the un‐reflected and the extraordinary. To better understand the process through which the relationship between computing devices, users and context changes in everyday life, we apply a distinction between time‐in and time‐out use. Time‐in technology use coincides and co‐exists within the flow of ordinary life, while time‐out use entails ‘taking time out’ of everyday life to accomplish a circumscribed task or engage reflectively in a particular experience. We apply a theoretically informed grounded approach to data collected through a longitudinal field study of smartphone users during a 6‐month period. We analysed the data based on the concept of time‐in/out and show the dynamics in the experience of a device that changes from the ‘extraordinary’ to the ‘ordinary’ over time. We also provide a vocabulary that describes this relationship as stages resembling the one between a couple, which evolves from an early love affair, to being married and to growing old together. By repurposing the time‐in/out distinction from its origin in media studies, this paper marks a move that allows the distinction to be applied to understanding the use and dynamic becoming of computing devices over time.
    October 22, 2012   doi: 10.1111/isj.12002   open full text
  • Examining interpersonal trust as a facilitator and uncertainty as an inhibitor of intra‐organisational knowledge sharing.
    Meng‐Hsiang Hsu, Chun‐Ming Chang.
    Information Systems Journal. September 25, 2012
    This study developed a theoretical model to explore the antecedents of interpersonal trust and the impact of interpersonal trust and uncertainty on intra‐organisational knowledge sharing in highly information‐technology‐mediated work environments. The proposed model was tested empirically using survey data collected from five telecommunication companies. The findings reveal that interpersonal trust has a positive effect on knowledge sharing, while uncertainty has a negative effect upon knowledge sharing. The results also show that social interaction ties and shared knowledge‐sharing vision are the antecedent factors of interpersonal trust, and that uncertainty regarding knowledge sharing is increased by seeker absorptive capability concerns, reciprocity concerns and fear of losing knowledge power. Some important implications for theory and practice as well as directions for future study are discussed.
    September 25, 2012   doi: 10.1111/isj.12000   open full text
  • Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service.
    Tejaswini Herath, Rui Chen, Jingguo Wang, Ketan Banjara, Jeff Wilbur, H. Raghav Rao.
    Information Systems Journal. July 27, 2012
    Email plays an important role in the digital economy but is threatened by increasingly sophisticated cybercrimes. A number of security services have been developed, including an email authentication service designed to cope with email threats. It remains unknown how users perceive and evaluate these security services and consequently form their adoption intention. Drawing on the Technology Acceptance Model and Technology Threat Avoidance Theory, this paper investigates the factors that affect user intention to adopt an email authentication service. Our results show that user intention to adopt an email security service is contingent upon users' perception of risk and evaluation of both internal and external coping strategies. This study contributes to research in security service adoption, service success and design, and information security behaviour.
    July 27, 2012   doi: 10.1111/j.1365-2575.2012.00420.x   open full text
  • Assembling infrastructures and business models for service design and innovation.
    George Kuk, Marijn Janssen.
    Information Systems Journal. July 23, 2012
    Most of the service innovation in e‐government initiatives has been initially focused on making a digital version of an equivalent physical service, followed by creating new services through either adopting new business models or overhauling existing infrastructures. The former approach uses variants of e‐commerce business models to drive service innovation whereas the latter entails changes to the backend for driving system efficiency and integration, which later serve for reorganising and improving service provision. Each approach presents a different way of assembling services, infrastructures, people and business models. The ramifications of each assemblage to service innovation are less understood. This paper seeks to examine the intended and unintended consequences of these two contrasting approaches inductively and deductively. Our findings show that a frontend approach enables quick improvements and enacts a variety of structures, with each structure inscribing a set of new path‐dependent routines in the infrastructures. In the backend approach it took longer to introduce new services. Yet the services were of a higher quality and required less modification in the long run. Quantitative analyses confirmed these findings. We attributed the alignment advantage of backend approach to better interdepartmental collaboration organised around a technology platform for system and service integration, concentrating resources on a coherent rather than a diverse set of business models. This approach realigns practices and routines and technology internally, whereas the explorative, diverse use of business models in the frontend approach for service innovation is less sustainable.
    July 23, 2012   doi: 10.1111/j.1365-2575.2012.00418.x   open full text
  • Understanding customers' repeat purchase intentions in B2C e‐commerce: the roles of utilitarian value, hedonic value and perceived risk.
    Chao‐Min Chiu, Eric T. G. Wang, Yu‐Hui Fang, Hsin‐Yi Huang.
    Information Systems Journal. July 15, 2012
    Customer loyalty or repeat purchasing is critical for the survival and success of any store. By focusing on online stores, this study investigates the repeat purchase intention of experienced online buyers based on means‐end chain theory and prospect theory. In the research model, both utilitarian value and hedonic value are hypothesised to affect repeat purchase intention positively. Perceived risk is hypothesised to affect repeat purchase intention negatively and moderate the effects of utilitarian and hedonic values on repeat purchase intention. Utilitarian value is proposed as a formative second‐order construct formed by product offerings, product information, monetary savings and convenience. Hedonic value is also proposed as a formative second‐order construct formed by the six hedonic benefits that have been identified in prior research. Data collected from 782 Yahoo!Kimo customers provide strong support for the research model. The results indicate that both the utilitarian value and hedonic value are positively associated with buyers' repeat purchase intention. A higher level of perceived risk reduces the effect of utilitarian value and increases the effect of hedonic value on repeat purchase intention. Implications for theory and practice and suggestions for future research are provided.
    July 15, 2012   doi: 10.1111/j.1365-2575.2012.00407.x   open full text
  • Autonomy and procedural justice in strategic systems planning.
    Dinesh A. Mirchandani, Albert L. Lederer.
    Information Systems Journal. July 13, 2012
    Job characteristics and procedural justice theories offer an avenue through which to better understand the effectiveness of the strategic planning of decision support and other information systems in the subsidiaries of multinational firms. The first theory suggests that greater autonomy leads to greater perceptions of fair treatment, and the second suggests that perceptions of fair treatment lead to greater commitment and performance. A postal survey of 130 chief information officers of the US subsidiaries of multinational firms collected data to test hypotheses based on the theory.Data analysis using partial least squares tested a high‐level model and a decomposed model. The high‐level model revealed that a second order strategic systems planning (SSP) autonomy construct predicted the perceptions of procedural justice, procedural justice predicted a second order SSP construct, and the SSP construct predicted SSP effectiveness. The decomposed model showed that autonomy in the especially creative strategy conception phase of planning predicted procedural justice. Procedural justice predicted all of the phases of SSP, while the strategy selection phase alone led to planning effectiveness.These findings underscore the impact of the autonomy to be creative and of the sense of fair treatment, both within the context of limited autonomy for the choice of the strategy. They highlight the impact of the choice of the strategy in contrast to other planning phases, and perhaps most importantly, they argue for local control of the planning process.
    July 13, 2012   doi: 10.1111/j.1365-2575.2012.00419.x   open full text
  • Personal information privacy and emerging technologies.
    Sue Conger, Joanne H. Pratt, Karen D. Loch.
    Information Systems Journal. May 31, 2012
    This research presents a model of personal information privacy (PIP) that includes not only transactional data gathering, but also interorganisational data sharing. Emerging technologies are used as a lens through which the discussion of PIP management is extended. Research directions are developed for aspects of privacy, privacy‐preserving technologies, interorganisational data sharing and policy development.
    May 31, 2012   doi: 10.1111/j.1365-2575.2012.00402.x   open full text
  • Drivers and export performance impacts of IT capability in ‘born‐global’ firms: a cross‐national study.
    Man Zhang, Saonee Sarker, Suprateek Sarker.
    Information Systems Journal. May 10, 2012
    Past research focusing on large firms has argued that information technology (IT) capability enhances firm performance. However, these studies have seldom explored why firms develop IT capability, and have also left a void the understanding of the role of IT capability in Small‐ and medium‐sized enterprises (SMEs). This study attempts to fill that void by examining the effect of relevant environmental and firm‐level factors on IT capability, and the effect of IT capability on the export performance of Chinese and US born‐global firms, a special breed of export‐focused SMEs. Results indicate that environmental factors such as information intensity, and firm‐level factors such as international entrepreneurial orientation, prompt born‐global firms to develop IT capability. Further, our results also strongly emphasise the positive role that IT capability plays on the performance of born‐global firms. Finally, a comparative analysis of the Chinese and US born‐global firms revealed a lack of a cross‐cultural difference in the factors leading these firms to develop IT capability, therefore supporting the ‘convergence’ perspective in cross‐cultural research.
    May 10, 2012   doi: 10.1111/j.1365-2575.2012.00404.x   open full text