{"title":"Responsible Digital: Co-Creating Safe, Wise and Secure Digital Interventions with Vulnerable Groups","authors":"Maria Rosa Lorini, G. Harindranath, Tim Unwin","doi":"10.1007/s10796-025-10611-4","DOIUrl":"https://doi.org/10.1007/s10796-025-10611-4","url":null,"abstract":"<p>The notion of “Responsible Digital” emphasises the ethical and responsible design and use of digital technologies. Having the knowledge and skills to navigate the digital world safely, wisely and securely becomes critical when digital literacy and access to technologies are limited and livelihood possibilities are precarious such as in the context of vulnerable migrants. We use the Responsible Research and Innovation (RRI) framework in its operationalised version called AREA Plus as a lens to reflect on our research-practice in relation to two projects in sensitive contexts that were designed with vulnerable groups to co-create digital interventions aimed at improving their lives. In so doing, we introduce a new ‘sustainability’ dimension to AREA Plus to develop what we term the AREAS framework. We contribute to knowledge by using the AREA Plus framework in the context of Africa, South East Asia and South America migration and by further enhancing it; to methodology by highlighting the procedures followed when working with vulnerable groups; and to practice through the promotion of responsible digital practices.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"245 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143945604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cognitive Impacts of Explainable AI in Cybersecurity Incident Response: Challenges and Propositions","authors":"Chen Zhong, Alper Yayla","doi":"10.1007/s10796-025-10609-y","DOIUrl":"https://doi.org/10.1007/s10796-025-10609-y","url":null,"abstract":"<p>Cybersecurity incident response (CSIR) is paramount for organizational resilience. At its core, analysts undertake a cognitively demanding process of data analytics to correlate data points, identify patterns, and synthesize diverse information. Recently, artificial intelligence (AI) based solutions have been utilized to streamline CSIR workflows, notably with an increasing focus on explainable AI (XAI) to ensure transparency. However, XAI also poses challenges, requiring analysts to allocate additional time to process explanations. This study addresses the gap in understanding how AI and its explanations can be seamlessly integrated into CSIR workflows. Employing a multi-method approach, we first interviewed analysts to identify their cognitive challenges, interactions with AI, and expectations from XAI. In a subsequent case study, we investigated the evolution of analysts' needs for AI explanations throughout the investigative process. Our findings yield several key propositions for addressing the cognitive impacts of XAI in CSIR, aiming to enhance cognitive fit to reduce analysts' cognitive load during investigations.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"41 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143940386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hao-Fan Chumg, Wen-Chin Tsao, Louise Cooke, Jonathan Seaton, I.-Hua Hung
{"title":"The Impact of Pluralistic Ignorance on Knowledge-Sharing Behaviour in Virtual Teams","authors":"Hao-Fan Chumg, Wen-Chin Tsao, Louise Cooke, Jonathan Seaton, I.-Hua Hung","doi":"10.1007/s10796-025-10601-6","DOIUrl":"https://doi.org/10.1007/s10796-025-10601-6","url":null,"abstract":"<p>Since Taiwan's economy is dominated by small and medium-sized enterprises, the formation of virtual teams is even more important for Taiwanese companies due to the impact of COVID- 19. Hence, this study draws on the virtual team climate and the theory of planned behaviour (TPB). However, it also adds pluralistic ignorance (which stems from social cognitive bias arising from universal behavioural adherence to social norms) as a key inhibitor to explore factors affecting the quantity and quality of knowledge-sharing behaviour through knowledge management systems (KMS) in virtual teams. A field survey of 528 employees from 72 companies in Taiwan and working in virtual teams was analysed utilising partial least squares structural equation modelling (PLS-SEM) to evaluate the outcomes empirically. The findings show that the virtual team climate, perceived behavioural control, and subjective norm still positively affect knowledge-sharing behaviour. However, more surprisingly, the moderating effect of pluralistic ignorance dampens the positive relationships between (1) the intention to share knowledge and knowledge-sharing behaviour and (2) the virtual team climate and knowledge-sharing behaviour within virtual teams. Finally, in addition to the practical implications for managers of knowledge-intensive companies who are keen to adopt virtual teams, this study provides several theoretical and managerial implications for relevant managers and academic researchers.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"62 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143920697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solution Path Algorithm for Double Margin Support Vector Machines","authors":"Guangrui Tang, Neng Fan","doi":"10.1007/s10796-025-10612-3","DOIUrl":"https://doi.org/10.1007/s10796-025-10612-3","url":null,"abstract":"<p>Data uncertainty is a challenging problem in machine learning. Distributionally robust optimization (DRO) can be used to model the data uncertainty. Based on DRO, a new support vector machines with double regularization terms and double margins can be derived. The proposed model can capture the data uncertainty in a probabilistic way and perform automatic feature selection for high dimensional data. We prove that the optimal solutions of this model change piecewise linearly with respect to the hyperparameters. Based on this property, we can derive the entire solution path by computing solutions only at the breakpoints. A solution path algorithm is proposed to efficiently identify the optimal solutions, thereby accelerating the hyperparameter tuning process. In computational efficiency experiments, the proposed solution path algorithm demonstrates superior performance compared to the CVXPY method and the Sequential Minimal Optimization (SMO) algorithm. Numerical experiments further confirm that the proposed model achieves robust performance even under noisy data conditions.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"115 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143910666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why do few Organizations Succeed while Others Fail? Impact of Organizational Capabilities and Barriers on Digital Government Transformation","authors":"Sandip Mukhopadhyay, Sumedha Chauhan, Manas Paul, Subhajit Bhattacharyya, Parijat Upadhyay, Shekhar Kumar Sinha","doi":"10.1007/s10796-025-10603-4","DOIUrl":"https://doi.org/10.1007/s10796-025-10603-4","url":null,"abstract":"<p>Government and public sector organizations focus on inclusiveness, transparency, security, and effectiveness. However, amid the ongoing deregulation and competition with private sectors, there are compulsions to leverage digital technologies for improving economic performance and customer satisfaction. In the above context, little is known about the role played by organizational capabilities in technology-led transformation of government. We employ SEM technique to validate our conceptual model that investigates the role of organizational capabilities on the degree of digitalization in the government organization and data for the same was collected from 196 government officials with relevant experience. The study found that effective digital strategy formulation increases employee digital capabilities and positively impacts digitalization in government. Vendor management capability is observed to mediate the relationship between digital strategy and digitalization in government while employee digital capability has an indirect impact through vendor management. Cultural and organizational barriers do not dampen the relationship between vendor management and digitalization in government. Our results integrate the dynamic capability framework with developments in digital transformation and technology sourcing literature.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"56 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143910665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Egena Ode, Ifedapo Francis Awolowo, Rabake Nana, Femi Stephen Olawoyin
{"title":"Social Capital and Artificial Intelligence Readiness: The Mediating Role of Cyber Resilience and Value Construction of Smes in Resource-Constrained Environments","authors":"Egena Ode, Ifedapo Francis Awolowo, Rabake Nana, Femi Stephen Olawoyin","doi":"10.1007/s10796-025-10608-z","DOIUrl":"https://doi.org/10.1007/s10796-025-10608-z","url":null,"abstract":"<p>Drawing on social capital theory, this study explores the antecedents of AI readiness in Small and Medium-sized Enterprises (SMEs) operating in resource-constrained environments, emphasising capabilities that mitigate cyber risks, and foster value construction in SMEs. Specifically, the study examines how structural, cognitive, and relational social capital fosters cyber resilience and contributes to proactive value construction, enhancing SMEs’ AI readiness and enabling them to construct and sustain value while safeguarding against potential cyber threats. The study adopts a Covariance-based Structural Equation Modelling (CB-SEM) approach to analyse 589 valid responses. A multi-wave data strategy with an interval cross-lagged design was implemented to reduce the risk of common method bias. The findings reveal that structural and relational capital significantly drive AI readiness, while cognitive social capital enhances cyber resilience, which is pivotal in constructing and protecting organisational value. Moreover, cyber resilience mediates the relationship between cognitive social capital and AI readiness, and enabling value construction amid cyber-related disruptions. SMEs with robust social capital networks are better equipped to leverage AI technologies for innovation and growth, construct new value streams, and defend against cyber risks, securing value in dynamic digital environments. This study contributes to the growing discourse on cybersecurity and digital transformation by offering insights into how SMEs can bolster digital innovation and construct sustainable value in the face of mounting cyber risks.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"16 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143889987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emmi Heinisuo, Päivikki Kuoppakangas, Jari Stenvall
{"title":"Navigating AI Implementation in Local Government: Addressing Dilemmas by Fostering Mutuality and Meaningfulness","authors":"Emmi Heinisuo, Päivikki Kuoppakangas, Jari Stenvall","doi":"10.1007/s10796-025-10599-x","DOIUrl":"https://doi.org/10.1007/s10796-025-10599-x","url":null,"abstract":"<p>This study explores AI-enabled local public service provisioning, especially dilemmas of the mutual and meaningful development process. Theoretically, it builds on the current literature on AI implementation in the public sector and relates it to the theorisations of mutuality and meaningfulness. Empirically, it examines the experiences of public agents in a qualitative case study of chatbot development by the City of Oulu, Finland. The study concludes six factors that are constructed into three interconnected dilemma pairs to examine cross-cutting problematic decision-making scenarios and provide reconciliations through mutuality and meaningfulness.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"8 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143880836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable Within Behavioral Cybersecurity Research","authors":"W. Alec Cram, John D’Arcy","doi":"10.1007/s10796-025-10606-1","DOIUrl":"https://doi.org/10.1007/s10796-025-10606-1","url":null,"abstract":"<p>A rich body of research examines the cybersecurity behavior of employees, with a particular focus on explaining the reasons why employees comply with (or violate) organizational cybersecurity policies. However, we posit that this emphasis on policy compliance is susceptible to several notable limitations that could lead to inaccurate research conclusions. In this research essay, we consider the limitations of using cybersecurity policy compliance as a dependent variable by presenting three assertions: (1) the link between policy compliance and organizational-level outcomes is ambiguous; (2) policies vary widely in terms of their clarity and completeness; and (3) employees have an inconsistent familiarity with their own organization’s cybersecurity policies. Taken together, we suggest that studying compliance with cybersecurity policies reveals only a partial picture of employee behavior. In response, we offer recommendations for future research.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"84 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143880834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kseniya Stsiampkouskaya, Oishee Kundu, Joanna Syrda, Adam Joinson
{"title":"Threats & Trade-offs: A Start-up Simulation Game for Cybersecurity and Innovation Decision-Making","authors":"Kseniya Stsiampkouskaya, Oishee Kundu, Joanna Syrda, Adam Joinson","doi":"10.1007/s10796-025-10604-3","DOIUrl":"https://doi.org/10.1007/s10796-025-10604-3","url":null,"abstract":"<p>Cybersecurity is now critically important in an increasingly digitized and connected world. In addition to required digital security, individuals and organisations pursue multiple other objectives under binding resource constraints. Understanding how they make decisions in the face of these trade-offs is important for both research and teaching purposes. Games can create effective and exciting learning environments and also provide an immersive and experiment-based research setting to understand decision-making. We present a novel tabletop board game which sets cybersecurity in a broader organisational context and emulates real life business decisions. It can be used as a powerful research tool to understand decision-making about cybersecurity in a resource-constrained and uncertain environment. It is also a useful interdisciplinary educational tool, integrating concepts from cybersecurity, business development, and innovation management in gameplay.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"4 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143863052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fabrizio Angiulli, Fabio Fassetti, Simona Nisticò, Luigi Palopoli
{"title":"Adversarial Anomaly Explanation","authors":"Fabrizio Angiulli, Fabio Fassetti, Simona Nisticò, Luigi Palopoli","doi":"10.1007/s10796-025-10605-2","DOIUrl":"https://doi.org/10.1007/s10796-025-10605-2","url":null,"abstract":"<p>Given a data set and one single object known to be anomalous beforehand, the <i>outlier explanation problem</i> consists in explaining the abnormality of the input object with respect to the data set population. The approach pursued in this paper to solve the above task consists in finding an <i>explanation</i>, namely, a piece of information encoding the characteristics that locate the anomalous data object far from the normal data. Our explanation consists of two components, the <i>choice</i>, encoding the set of features in which the anomalous object deviates from the rest of the population, and the <i>mask</i>, encoding the associated amount of deviation with respect to the normality. The goal here is not to explain the decisional process of a model but, rather, to provide an explanation justifying the output of the decisional process by only inspecting the data set on which the decision has been made. We tackle this problem by introducing an innovative deep learning architecture, called MMOAM, based on the adversarial learning paradigm. We assess the effectiveness of our technique over both synthetic and real data sets and compare it against state of the art outlier explanation methods reporting better performances in different scenarios.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"26 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143853421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}