Information Systems Frontiers最新文献

筛选
英文 中文
Responsible Digital: Co-Creating Safe, Wise and Secure Digital Interventions with Vulnerable Groups 负责任的数字:与弱势群体共同创造安全、明智和可靠的数字干预措施
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-05-14 DOI: 10.1007/s10796-025-10611-4
Maria Rosa Lorini, G. Harindranath, Tim Unwin
{"title":"Responsible Digital: Co-Creating Safe, Wise and Secure Digital Interventions with Vulnerable Groups","authors":"Maria Rosa Lorini, G. Harindranath, Tim Unwin","doi":"10.1007/s10796-025-10611-4","DOIUrl":"https://doi.org/10.1007/s10796-025-10611-4","url":null,"abstract":"<p>The notion of “Responsible Digital” emphasises the ethical and responsible design and use of digital technologies. Having the knowledge and skills to navigate the digital world safely, wisely and securely becomes critical when digital literacy and access to technologies are limited and livelihood possibilities are precarious such as in the context of vulnerable migrants. We use the Responsible Research and Innovation (RRI) framework in its operationalised version called AREA Plus as a lens to reflect on our research-practice in relation to two projects in sensitive contexts that were designed with vulnerable groups to co-create digital interventions aimed at improving their lives. In so doing, we introduce a new ‘sustainability’ dimension to AREA Plus to develop what we term the AREAS framework. We contribute to knowledge by using the AREA Plus framework in the context of Africa, South East Asia and South America migration and by further enhancing it; to methodology by highlighting the procedures followed when working with vulnerable groups; and to practice through the promotion of responsible digital practices.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"245 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143945604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognitive Impacts of Explainable AI in Cybersecurity Incident Response: Challenges and Propositions 可解释人工智能在网络安全事件响应中的认知影响:挑战与主张
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-05-13 DOI: 10.1007/s10796-025-10609-y
Chen Zhong, Alper Yayla
{"title":"Cognitive Impacts of Explainable AI in Cybersecurity Incident Response: Challenges and Propositions","authors":"Chen Zhong, Alper Yayla","doi":"10.1007/s10796-025-10609-y","DOIUrl":"https://doi.org/10.1007/s10796-025-10609-y","url":null,"abstract":"<p>Cybersecurity incident response (CSIR) is paramount for organizational resilience. At its core, analysts undertake a cognitively demanding process of data analytics to correlate data points, identify patterns, and synthesize diverse information. Recently, artificial intelligence (AI) based solutions have been utilized to streamline CSIR workflows, notably with an increasing focus on explainable AI (XAI) to ensure transparency. However, XAI also poses challenges, requiring analysts to allocate additional time to process explanations. This study addresses the gap in understanding how AI and its explanations can be seamlessly integrated into CSIR workflows. Employing a multi-method approach, we first interviewed analysts to identify their cognitive challenges, interactions with AI, and expectations from XAI. In a subsequent case study, we investigated the evolution of analysts' needs for AI explanations throughout the investigative process. Our findings yield several key propositions for addressing the cognitive impacts of XAI in CSIR, aiming to enhance cognitive fit to reduce analysts' cognitive load during investigations.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"41 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143940386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Pluralistic Ignorance on Knowledge-Sharing Behaviour in Virtual Teams 多元无知对虚拟团队知识共享行为的影响
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-05-08 DOI: 10.1007/s10796-025-10601-6
Hao-Fan Chumg, Wen-Chin Tsao, Louise Cooke, Jonathan Seaton, I.-Hua Hung
{"title":"The Impact of Pluralistic Ignorance on Knowledge-Sharing Behaviour in Virtual Teams","authors":"Hao-Fan Chumg, Wen-Chin Tsao, Louise Cooke, Jonathan Seaton, I.-Hua Hung","doi":"10.1007/s10796-025-10601-6","DOIUrl":"https://doi.org/10.1007/s10796-025-10601-6","url":null,"abstract":"<p>Since Taiwan's economy is dominated by small and medium-sized enterprises, the formation of virtual teams is even more important for Taiwanese companies due to the impact of COVID- 19. Hence, this study draws on the virtual team climate and the theory of planned behaviour (TPB). However, it also adds pluralistic ignorance (which stems from social cognitive bias arising from universal behavioural adherence to social norms) as a key inhibitor to explore factors affecting the quantity and quality of knowledge-sharing behaviour through knowledge management systems (KMS) in virtual teams. A field survey of 528 employees from 72 companies in Taiwan and working in virtual teams was analysed utilising partial least squares structural equation modelling (PLS-SEM) to evaluate the outcomes empirically. The findings show that the virtual team climate, perceived behavioural control, and subjective norm still positively affect knowledge-sharing behaviour. However, more surprisingly, the moderating effect of pluralistic ignorance dampens the positive relationships between (1) the intention to share knowledge and knowledge-sharing behaviour and (2) the virtual team climate and knowledge-sharing behaviour within virtual teams. Finally, in addition to the practical implications for managers of knowledge-intensive companies who are keen to adopt virtual teams, this study provides several theoretical and managerial implications for relevant managers and academic researchers.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"62 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143920697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solution Path Algorithm for Double Margin Support Vector Machines 双边界支持向量机的解路径算法
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-05-05 DOI: 10.1007/s10796-025-10612-3
Guangrui Tang, Neng Fan
{"title":"Solution Path Algorithm for Double Margin Support Vector Machines","authors":"Guangrui Tang, Neng Fan","doi":"10.1007/s10796-025-10612-3","DOIUrl":"https://doi.org/10.1007/s10796-025-10612-3","url":null,"abstract":"<p>Data uncertainty is a challenging problem in machine learning. Distributionally robust optimization (DRO) can be used to model the data uncertainty. Based on DRO, a new support vector machines with double regularization terms and double margins can be derived. The proposed model can capture the data uncertainty in a probabilistic way and perform automatic feature selection for high dimensional data. We prove that the optimal solutions of this model change piecewise linearly with respect to the hyperparameters. Based on this property, we can derive the entire solution path by computing solutions only at the breakpoints. A solution path algorithm is proposed to efficiently identify the optimal solutions, thereby accelerating the hyperparameter tuning process. In computational efficiency experiments, the proposed solution path algorithm demonstrates superior performance compared to the CVXPY method and the Sequential Minimal Optimization (SMO) algorithm. Numerical experiments further confirm that the proposed model achieves robust performance even under noisy data conditions.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"115 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143910666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why do few Organizations Succeed while Others Fail? Impact of Organizational Capabilities and Barriers on Digital Government Transformation 为什么只有少数组织成功而其他组织却失败了?组织能力与障碍对数字化政府转型的影响
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-05-04 DOI: 10.1007/s10796-025-10603-4
Sandip Mukhopadhyay, Sumedha Chauhan, Manas Paul, Subhajit Bhattacharyya, Parijat Upadhyay, Shekhar Kumar Sinha
{"title":"Why do few Organizations Succeed while Others Fail? Impact of Organizational Capabilities and Barriers on Digital Government Transformation","authors":"Sandip Mukhopadhyay, Sumedha Chauhan, Manas Paul, Subhajit Bhattacharyya, Parijat Upadhyay, Shekhar Kumar Sinha","doi":"10.1007/s10796-025-10603-4","DOIUrl":"https://doi.org/10.1007/s10796-025-10603-4","url":null,"abstract":"<p>Government and public sector organizations focus on inclusiveness, transparency, security, and effectiveness. However, amid the ongoing deregulation and competition with private sectors, there are compulsions to leverage digital technologies for improving economic performance and customer satisfaction. In the above context, little is known about the role played by organizational capabilities in technology-led transformation of government. We employ SEM technique to validate our conceptual model that investigates the role of organizational capabilities on the degree of digitalization in the government organization and data for the same was collected from 196 government officials with relevant experience. The study found that effective digital strategy formulation increases employee digital capabilities and positively impacts digitalization in government. Vendor management capability is observed to mediate the relationship between digital strategy and digitalization in government while employee digital capability has an indirect impact through vendor management. Cultural and organizational barriers do not dampen the relationship between vendor management and digitalization in government. Our results integrate the dynamic capability framework with developments in digital transformation and technology sourcing literature.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"56 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143910665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Capital and Artificial Intelligence Readiness: The Mediating Role of Cyber Resilience and Value Construction of Smes in Resource-Constrained Environments 社会资本与人工智能准备:资源约束环境下中小企业网络弹性与价值构建的中介作用
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-04-30 DOI: 10.1007/s10796-025-10608-z
Egena Ode, Ifedapo Francis Awolowo, Rabake Nana, Femi Stephen Olawoyin
{"title":"Social Capital and Artificial Intelligence Readiness: The Mediating Role of Cyber Resilience and Value Construction of Smes in Resource-Constrained Environments","authors":"Egena Ode, Ifedapo Francis Awolowo, Rabake Nana, Femi Stephen Olawoyin","doi":"10.1007/s10796-025-10608-z","DOIUrl":"https://doi.org/10.1007/s10796-025-10608-z","url":null,"abstract":"<p>Drawing on social capital theory, this study explores the antecedents of AI readiness in Small and Medium-sized Enterprises (SMEs) operating in resource-constrained environments, emphasising capabilities that mitigate cyber risks, and foster value construction in SMEs. Specifically, the study examines how structural, cognitive, and relational social capital fosters cyber resilience and contributes to proactive value construction, enhancing SMEs’ AI readiness and enabling them to construct and sustain value while safeguarding against potential cyber threats. The study adopts a Covariance-based Structural Equation Modelling (CB-SEM) approach to analyse 589 valid responses. A multi-wave data strategy with an interval cross-lagged design was implemented to reduce the risk of common method bias. The findings reveal that structural and relational capital significantly drive AI readiness, while cognitive social capital enhances cyber resilience, which is pivotal in constructing and protecting organisational value. Moreover, cyber resilience mediates the relationship between cognitive social capital and AI readiness, and enabling value construction amid cyber-related disruptions. SMEs with robust social capital networks are better equipped to leverage AI technologies for innovation and growth, construct new value streams, and defend against cyber risks, securing value in dynamic digital environments. This study contributes to the growing discourse on cybersecurity and digital transformation by offering insights into how SMEs can bolster digital innovation and construct sustainable value in the face of mounting cyber risks.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"16 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143889987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Navigating AI Implementation in Local Government: Addressing Dilemmas by Fostering Mutuality and Meaningfulness 引导人工智能在地方政府的实施:通过促进相互性和意义来解决困境
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-04-28 DOI: 10.1007/s10796-025-10599-x
Emmi Heinisuo, Päivikki Kuoppakangas, Jari Stenvall
{"title":"Navigating AI Implementation in Local Government: Addressing Dilemmas by Fostering Mutuality and Meaningfulness","authors":"Emmi Heinisuo, Päivikki Kuoppakangas, Jari Stenvall","doi":"10.1007/s10796-025-10599-x","DOIUrl":"https://doi.org/10.1007/s10796-025-10599-x","url":null,"abstract":"<p>This study explores AI-enabled local public service provisioning, especially dilemmas of the mutual and meaningful development process. Theoretically, it builds on the current literature on AI implementation in the public sector and relates it to the theorisations of mutuality and meaningfulness. Empirically, it examines the experiences of public agents in a qualitative case study of chatbot development by the City of Oulu, Finland. The study concludes six factors that are constructed into three interconnected dilemma pairs to examine cross-cutting problematic decision-making scenarios and provide reconciliations through mutuality and meaningfulness.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"8 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143880836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable Within Behavioral Cybersecurity Research 找错对象了?行为网络安全研究中政策遵从性的因变量反思
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-04-28 DOI: 10.1007/s10796-025-10606-1
W. Alec Cram, John D’Arcy
{"title":"Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable Within Behavioral Cybersecurity Research","authors":"W. Alec Cram, John D’Arcy","doi":"10.1007/s10796-025-10606-1","DOIUrl":"https://doi.org/10.1007/s10796-025-10606-1","url":null,"abstract":"<p>A rich body of research examines the cybersecurity behavior of employees, with a particular focus on explaining the reasons why employees comply with (or violate) organizational cybersecurity policies. However, we posit that this emphasis on policy compliance is susceptible to several notable limitations that could lead to inaccurate research conclusions. In this research essay, we consider the limitations of using cybersecurity policy compliance as a dependent variable by presenting three assertions: (1) the link between policy compliance and organizational-level outcomes is ambiguous; (2) policies vary widely in terms of their clarity and completeness; and (3) employees have an inconsistent familiarity with their own organization’s cybersecurity policies. Taken together, we suggest that studying compliance with cybersecurity policies reveals only a partial picture of employee behavior. In response, we offer recommendations for future research.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"84 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143880834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threats & Trade-offs: A Start-up Simulation Game for Cybersecurity and Innovation Decision-Making 威胁与权衡:网络安全和创新决策的启动模拟游戏
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-04-22 DOI: 10.1007/s10796-025-10604-3
Kseniya Stsiampkouskaya, Oishee Kundu, Joanna Syrda, Adam Joinson
{"title":"Threats & Trade-offs: A Start-up Simulation Game for Cybersecurity and Innovation Decision-Making","authors":"Kseniya Stsiampkouskaya, Oishee Kundu, Joanna Syrda, Adam Joinson","doi":"10.1007/s10796-025-10604-3","DOIUrl":"https://doi.org/10.1007/s10796-025-10604-3","url":null,"abstract":"<p>Cybersecurity is now critically important in an increasingly digitized and connected world. In addition to required digital security, individuals and organisations pursue multiple other objectives under binding resource constraints. Understanding how they make decisions in the face of these trade-offs is important for both research and teaching purposes. Games can create effective and exciting learning environments and also provide an immersive and experiment-based research setting to understand decision-making. We present a novel tabletop board game which sets cybersecurity in a broader organisational context and emulates real life business decisions. It can be used as a powerful research tool to understand decision-making about cybersecurity in a resource-constrained and uncertain environment. It is also a useful interdisciplinary educational tool, integrating concepts from cybersecurity, business development, and innovation management in gameplay.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"4 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143863052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Anomaly Explanation 对抗性异常解释
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-04-21 DOI: 10.1007/s10796-025-10605-2
Fabrizio Angiulli, Fabio Fassetti, Simona Nisticò, Luigi Palopoli
{"title":"Adversarial Anomaly Explanation","authors":"Fabrizio Angiulli, Fabio Fassetti, Simona Nisticò, Luigi Palopoli","doi":"10.1007/s10796-025-10605-2","DOIUrl":"https://doi.org/10.1007/s10796-025-10605-2","url":null,"abstract":"<p>Given a data set and one single object known to be anomalous beforehand, the <i>outlier explanation problem</i> consists in explaining the abnormality of the input object with respect to the data set population. The approach pursued in this paper to solve the above task consists in finding an <i>explanation</i>, namely, a piece of information encoding the characteristics that locate the anomalous data object far from the normal data. Our explanation consists of two components, the <i>choice</i>, encoding the set of features in which the anomalous object deviates from the rest of the population, and the <i>mask</i>, encoding the associated amount of deviation with respect to the normality. The goal here is not to explain the decisional process of a model but, rather, to provide an explanation justifying the output of the decisional process by only inspecting the data set on which the decision has been made. We tackle this problem by introducing an innovative deep learning architecture, called MMOAM, based on the adversarial learning paradigm. We assess the effectiveness of our technique over both synthetic and real data sets and compare it against state of the art outlier explanation methods reporting better performances in different scenarios.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"26 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143853421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信