Christine Abdalla Mikhaeil, Raji Raman, Tabitha L. James, Viswanath Venkatesh
{"title":"The Sky is Falling, UTAUT Has Failed! An Investigation of the Adoption of Privacy-Enhancing Technologies (PETs)","authors":"Christine Abdalla Mikhaeil, Raji Raman, Tabitha L. James, Viswanath Venkatesh","doi":"10.1007/s10796-025-10607-0","DOIUrl":"https://doi.org/10.1007/s10796-025-10607-0","url":null,"abstract":"<p>In the age of artificial intelligence (AI) and data-hungry applications, privacy-enhancing technologies (PETs) offer a way for individuals to limit data collection and processing by these applications. Yet, the adoption of PETs remains low and user-focused research on adoption predictors is limited. In this work, we use the unified theory of acceptance and use of technology 2 (UTAUT2) to study the adoption of five categories of personal PETs: private browsing, privacy-focused web browsers, privacy browser extensions, secure (encrypted) messaging, and secure (encrypted) email. Our results confirmed the significant role of social influence and habit as predictors of adoption of PETs but also showed that the adoption of these five categories of PETs was not driven by the same set of factors. These differences call for more contextualized research to study the adoption of PETs and raise the potential issue of the limits of the generalizability of UTAUT2. The discovery of the lack of support for such an established theory also creates the potential for breaking new ground through the development of new theories of adoption that are better suited to the emerging world of technologies including PETs.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"133 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144130216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Interplay of Digital Responsibility and Digital Transformation: Empirical Insights from a Nationwide Digital Transformation","authors":"Isabella Urban, Ralf Plattfaut","doi":"10.1007/s10796-025-10610-5","DOIUrl":"https://doi.org/10.1007/s10796-025-10610-5","url":null,"abstract":"<p>As digital transformation progresses, research broadens its perspective to not only focus on the positive effects but also on the adverse impacts of the increasing use of digital technologies. Against this backdrop, the issue of being responsibly digital moves to the foreground in research and practice. The need for further research on the conceptualization of digital responsibility and its role in the context of digital transformation has been indicated by the literature. In this paper, we empirically investigate the interplay of digital responsibility and digital transformation in the context of large-scale digital transformation. Based on our results, we derive four core contributions for IS theory as we highlight the prime role of digital responsibility in contemporary digital transformation processes, refine the conceptualization of digital responsibility in the context of digital transformation, propose six dynamic interplays of digital responsibility and digital transformation, and present promising avenues for further research on this increasingly relevant phenomenon.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"1 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144104529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Responsible Digital: Co-Creating Safe, Wise and Secure Digital Interventions with Vulnerable Groups","authors":"Maria Rosa Lorini, G. Harindranath, Tim Unwin","doi":"10.1007/s10796-025-10611-4","DOIUrl":"https://doi.org/10.1007/s10796-025-10611-4","url":null,"abstract":"<p>The notion of “Responsible Digital” emphasises the ethical and responsible design and use of digital technologies. Having the knowledge and skills to navigate the digital world safely, wisely and securely becomes critical when digital literacy and access to technologies are limited and livelihood possibilities are precarious such as in the context of vulnerable migrants. We use the Responsible Research and Innovation (RRI) framework in its operationalised version called AREA Plus as a lens to reflect on our research-practice in relation to two projects in sensitive contexts that were designed with vulnerable groups to co-create digital interventions aimed at improving their lives. In so doing, we introduce a new ‘sustainability’ dimension to AREA Plus to develop what we term the AREAS framework. We contribute to knowledge by using the AREA Plus framework in the context of Africa, South East Asia and South America migration and by further enhancing it; to methodology by highlighting the procedures followed when working with vulnerable groups; and to practice through the promotion of responsible digital practices.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"245 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143945604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cognitive Impacts of Explainable AI in Cybersecurity Incident Response: Challenges and Propositions","authors":"Chen Zhong, Alper Yayla","doi":"10.1007/s10796-025-10609-y","DOIUrl":"https://doi.org/10.1007/s10796-025-10609-y","url":null,"abstract":"<p>Cybersecurity incident response (CSIR) is paramount for organizational resilience. At its core, analysts undertake a cognitively demanding process of data analytics to correlate data points, identify patterns, and synthesize diverse information. Recently, artificial intelligence (AI) based solutions have been utilized to streamline CSIR workflows, notably with an increasing focus on explainable AI (XAI) to ensure transparency. However, XAI also poses challenges, requiring analysts to allocate additional time to process explanations. This study addresses the gap in understanding how AI and its explanations can be seamlessly integrated into CSIR workflows. Employing a multi-method approach, we first interviewed analysts to identify their cognitive challenges, interactions with AI, and expectations from XAI. In a subsequent case study, we investigated the evolution of analysts' needs for AI explanations throughout the investigative process. Our findings yield several key propositions for addressing the cognitive impacts of XAI in CSIR, aiming to enhance cognitive fit to reduce analysts' cognitive load during investigations.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"41 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143940386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hao-Fan Chumg, Wen-Chin Tsao, Louise Cooke, Jonathan Seaton, I.-Hua Hung
{"title":"The Impact of Pluralistic Ignorance on Knowledge-Sharing Behaviour in Virtual Teams","authors":"Hao-Fan Chumg, Wen-Chin Tsao, Louise Cooke, Jonathan Seaton, I.-Hua Hung","doi":"10.1007/s10796-025-10601-6","DOIUrl":"https://doi.org/10.1007/s10796-025-10601-6","url":null,"abstract":"<p>Since Taiwan's economy is dominated by small and medium-sized enterprises, the formation of virtual teams is even more important for Taiwanese companies due to the impact of COVID- 19. Hence, this study draws on the virtual team climate and the theory of planned behaviour (TPB). However, it also adds pluralistic ignorance (which stems from social cognitive bias arising from universal behavioural adherence to social norms) as a key inhibitor to explore factors affecting the quantity and quality of knowledge-sharing behaviour through knowledge management systems (KMS) in virtual teams. A field survey of 528 employees from 72 companies in Taiwan and working in virtual teams was analysed utilising partial least squares structural equation modelling (PLS-SEM) to evaluate the outcomes empirically. The findings show that the virtual team climate, perceived behavioural control, and subjective norm still positively affect knowledge-sharing behaviour. However, more surprisingly, the moderating effect of pluralistic ignorance dampens the positive relationships between (1) the intention to share knowledge and knowledge-sharing behaviour and (2) the virtual team climate and knowledge-sharing behaviour within virtual teams. Finally, in addition to the practical implications for managers of knowledge-intensive companies who are keen to adopt virtual teams, this study provides several theoretical and managerial implications for relevant managers and academic researchers.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"62 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143920697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solution Path Algorithm for Double Margin Support Vector Machines","authors":"Guangrui Tang, Neng Fan","doi":"10.1007/s10796-025-10612-3","DOIUrl":"https://doi.org/10.1007/s10796-025-10612-3","url":null,"abstract":"<p>Data uncertainty is a challenging problem in machine learning. Distributionally robust optimization (DRO) can be used to model the data uncertainty. Based on DRO, a new support vector machines with double regularization terms and double margins can be derived. The proposed model can capture the data uncertainty in a probabilistic way and perform automatic feature selection for high dimensional data. We prove that the optimal solutions of this model change piecewise linearly with respect to the hyperparameters. Based on this property, we can derive the entire solution path by computing solutions only at the breakpoints. A solution path algorithm is proposed to efficiently identify the optimal solutions, thereby accelerating the hyperparameter tuning process. In computational efficiency experiments, the proposed solution path algorithm demonstrates superior performance compared to the CVXPY method and the Sequential Minimal Optimization (SMO) algorithm. Numerical experiments further confirm that the proposed model achieves robust performance even under noisy data conditions.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"115 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143910666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why do few Organizations Succeed while Others Fail? Impact of Organizational Capabilities and Barriers on Digital Government Transformation","authors":"Sandip Mukhopadhyay, Sumedha Chauhan, Manas Paul, Subhajit Bhattacharyya, Parijat Upadhyay, Shekhar Kumar Sinha","doi":"10.1007/s10796-025-10603-4","DOIUrl":"https://doi.org/10.1007/s10796-025-10603-4","url":null,"abstract":"<p>Government and public sector organizations focus on inclusiveness, transparency, security, and effectiveness. However, amid the ongoing deregulation and competition with private sectors, there are compulsions to leverage digital technologies for improving economic performance and customer satisfaction. In the above context, little is known about the role played by organizational capabilities in technology-led transformation of government. We employ SEM technique to validate our conceptual model that investigates the role of organizational capabilities on the degree of digitalization in the government organization and data for the same was collected from 196 government officials with relevant experience. The study found that effective digital strategy formulation increases employee digital capabilities and positively impacts digitalization in government. Vendor management capability is observed to mediate the relationship between digital strategy and digitalization in government while employee digital capability has an indirect impact through vendor management. Cultural and organizational barriers do not dampen the relationship between vendor management and digitalization in government. Our results integrate the dynamic capability framework with developments in digital transformation and technology sourcing literature.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"56 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143910665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Egena Ode, Ifedapo Francis Awolowo, Rabake Nana, Femi Stephen Olawoyin
{"title":"Social Capital and Artificial Intelligence Readiness: The Mediating Role of Cyber Resilience and Value Construction of Smes in Resource-Constrained Environments","authors":"Egena Ode, Ifedapo Francis Awolowo, Rabake Nana, Femi Stephen Olawoyin","doi":"10.1007/s10796-025-10608-z","DOIUrl":"https://doi.org/10.1007/s10796-025-10608-z","url":null,"abstract":"<p>Drawing on social capital theory, this study explores the antecedents of AI readiness in Small and Medium-sized Enterprises (SMEs) operating in resource-constrained environments, emphasising capabilities that mitigate cyber risks, and foster value construction in SMEs. Specifically, the study examines how structural, cognitive, and relational social capital fosters cyber resilience and contributes to proactive value construction, enhancing SMEs’ AI readiness and enabling them to construct and sustain value while safeguarding against potential cyber threats. The study adopts a Covariance-based Structural Equation Modelling (CB-SEM) approach to analyse 589 valid responses. A multi-wave data strategy with an interval cross-lagged design was implemented to reduce the risk of common method bias. The findings reveal that structural and relational capital significantly drive AI readiness, while cognitive social capital enhances cyber resilience, which is pivotal in constructing and protecting organisational value. Moreover, cyber resilience mediates the relationship between cognitive social capital and AI readiness, and enabling value construction amid cyber-related disruptions. SMEs with robust social capital networks are better equipped to leverage AI technologies for innovation and growth, construct new value streams, and defend against cyber risks, securing value in dynamic digital environments. This study contributes to the growing discourse on cybersecurity and digital transformation by offering insights into how SMEs can bolster digital innovation and construct sustainable value in the face of mounting cyber risks.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"16 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143889987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emmi Heinisuo, Päivikki Kuoppakangas, Jari Stenvall
{"title":"Navigating AI Implementation in Local Government: Addressing Dilemmas by Fostering Mutuality and Meaningfulness","authors":"Emmi Heinisuo, Päivikki Kuoppakangas, Jari Stenvall","doi":"10.1007/s10796-025-10599-x","DOIUrl":"https://doi.org/10.1007/s10796-025-10599-x","url":null,"abstract":"<p>This study explores AI-enabled local public service provisioning, especially dilemmas of the mutual and meaningful development process. Theoretically, it builds on the current literature on AI implementation in the public sector and relates it to the theorisations of mutuality and meaningfulness. Empirically, it examines the experiences of public agents in a qualitative case study of chatbot development by the City of Oulu, Finland. The study concludes six factors that are constructed into three interconnected dilemma pairs to examine cross-cutting problematic decision-making scenarios and provide reconciliations through mutuality and meaningfulness.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"8 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143880836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable Within Behavioral Cybersecurity Research","authors":"W. Alec Cram, John D’Arcy","doi":"10.1007/s10796-025-10606-1","DOIUrl":"https://doi.org/10.1007/s10796-025-10606-1","url":null,"abstract":"<p>A rich body of research examines the cybersecurity behavior of employees, with a particular focus on explaining the reasons why employees comply with (or violate) organizational cybersecurity policies. However, we posit that this emphasis on policy compliance is susceptible to several notable limitations that could lead to inaccurate research conclusions. In this research essay, we consider the limitations of using cybersecurity policy compliance as a dependent variable by presenting three assertions: (1) the link between policy compliance and organizational-level outcomes is ambiguous; (2) policies vary widely in terms of their clarity and completeness; and (3) employees have an inconsistent familiarity with their own organization’s cybersecurity policies. Taken together, we suggest that studying compliance with cybersecurity policies reveals only a partial picture of employee behavior. In response, we offer recommendations for future research.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"84 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143880834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}