Information Systems Frontiers最新文献

筛选
英文 中文
The Sky is Falling, UTAUT Has Failed! An Investigation of the Adoption of Privacy-Enhancing Technologies (PETs) 天要塌了,太空站失败了!采用增强私隐技术的调查
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-05-24 DOI: 10.1007/s10796-025-10607-0
Christine Abdalla Mikhaeil, Raji Raman, Tabitha L. James, Viswanath Venkatesh
{"title":"The Sky is Falling, UTAUT Has Failed! An Investigation of the Adoption of Privacy-Enhancing Technologies (PETs)","authors":"Christine Abdalla Mikhaeil, Raji Raman, Tabitha L. James, Viswanath Venkatesh","doi":"10.1007/s10796-025-10607-0","DOIUrl":"https://doi.org/10.1007/s10796-025-10607-0","url":null,"abstract":"<p>In the age of artificial intelligence (AI) and data-hungry applications, privacy-enhancing technologies (PETs) offer a way for individuals to limit data collection and processing by these applications. Yet, the adoption of PETs remains low and user-focused research on adoption predictors is limited. In this work, we use the unified theory of acceptance and use of technology 2 (UTAUT2) to study the adoption of five categories of personal PETs: private browsing, privacy-focused web browsers, privacy browser extensions, secure (encrypted) messaging, and secure (encrypted) email. Our results confirmed the significant role of social influence and habit as predictors of adoption of PETs but also showed that the adoption of these five categories of PETs was not driven by the same set of factors. These differences call for more contextualized research to study the adoption of PETs and raise the potential issue of the limits of the generalizability of UTAUT2. The discovery of the lack of support for such an established theory also creates the potential for breaking new ground through the development of new theories of adoption that are better suited to the emerging world of technologies including PETs.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"133 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144130216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Interplay of Digital Responsibility and Digital Transformation: Empirical Insights from a Nationwide Digital Transformation 数字责任与数字转型的相互作用:来自全国数字转型的实证见解
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-05-21 DOI: 10.1007/s10796-025-10610-5
Isabella Urban, Ralf Plattfaut
{"title":"The Interplay of Digital Responsibility and Digital Transformation: Empirical Insights from a Nationwide Digital Transformation","authors":"Isabella Urban, Ralf Plattfaut","doi":"10.1007/s10796-025-10610-5","DOIUrl":"https://doi.org/10.1007/s10796-025-10610-5","url":null,"abstract":"<p>As digital transformation progresses, research broadens its perspective to not only focus on the positive effects but also on the adverse impacts of the increasing use of digital technologies. Against this backdrop, the issue of being responsibly digital moves to the foreground in research and practice. The need for further research on the conceptualization of digital responsibility and its role in the context of digital transformation has been indicated by the literature. In this paper, we empirically investigate the interplay of digital responsibility and digital transformation in the context of large-scale digital transformation. Based on our results, we derive four core contributions for IS theory as we highlight the prime role of digital responsibility in contemporary digital transformation processes, refine the conceptualization of digital responsibility in the context of digital transformation, propose six dynamic interplays of digital responsibility and digital transformation, and present promising avenues for further research on this increasingly relevant phenomenon.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"1 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144104529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Responsible Digital: Co-Creating Safe, Wise and Secure Digital Interventions with Vulnerable Groups 负责任的数字:与弱势群体共同创造安全、明智和可靠的数字干预措施
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-05-14 DOI: 10.1007/s10796-025-10611-4
Maria Rosa Lorini, G. Harindranath, Tim Unwin
{"title":"Responsible Digital: Co-Creating Safe, Wise and Secure Digital Interventions with Vulnerable Groups","authors":"Maria Rosa Lorini, G. Harindranath, Tim Unwin","doi":"10.1007/s10796-025-10611-4","DOIUrl":"https://doi.org/10.1007/s10796-025-10611-4","url":null,"abstract":"<p>The notion of “Responsible Digital” emphasises the ethical and responsible design and use of digital technologies. Having the knowledge and skills to navigate the digital world safely, wisely and securely becomes critical when digital literacy and access to technologies are limited and livelihood possibilities are precarious such as in the context of vulnerable migrants. We use the Responsible Research and Innovation (RRI) framework in its operationalised version called AREA Plus as a lens to reflect on our research-practice in relation to two projects in sensitive contexts that were designed with vulnerable groups to co-create digital interventions aimed at improving their lives. In so doing, we introduce a new ‘sustainability’ dimension to AREA Plus to develop what we term the AREAS framework. We contribute to knowledge by using the AREA Plus framework in the context of Africa, South East Asia and South America migration and by further enhancing it; to methodology by highlighting the procedures followed when working with vulnerable groups; and to practice through the promotion of responsible digital practices.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"245 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143945604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognitive Impacts of Explainable AI in Cybersecurity Incident Response: Challenges and Propositions 可解释人工智能在网络安全事件响应中的认知影响:挑战与主张
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-05-13 DOI: 10.1007/s10796-025-10609-y
Chen Zhong, Alper Yayla
{"title":"Cognitive Impacts of Explainable AI in Cybersecurity Incident Response: Challenges and Propositions","authors":"Chen Zhong, Alper Yayla","doi":"10.1007/s10796-025-10609-y","DOIUrl":"https://doi.org/10.1007/s10796-025-10609-y","url":null,"abstract":"<p>Cybersecurity incident response (CSIR) is paramount for organizational resilience. At its core, analysts undertake a cognitively demanding process of data analytics to correlate data points, identify patterns, and synthesize diverse information. Recently, artificial intelligence (AI) based solutions have been utilized to streamline CSIR workflows, notably with an increasing focus on explainable AI (XAI) to ensure transparency. However, XAI also poses challenges, requiring analysts to allocate additional time to process explanations. This study addresses the gap in understanding how AI and its explanations can be seamlessly integrated into CSIR workflows. Employing a multi-method approach, we first interviewed analysts to identify their cognitive challenges, interactions with AI, and expectations from XAI. In a subsequent case study, we investigated the evolution of analysts' needs for AI explanations throughout the investigative process. Our findings yield several key propositions for addressing the cognitive impacts of XAI in CSIR, aiming to enhance cognitive fit to reduce analysts' cognitive load during investigations.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"41 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143940386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Pluralistic Ignorance on Knowledge-Sharing Behaviour in Virtual Teams 多元无知对虚拟团队知识共享行为的影响
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-05-08 DOI: 10.1007/s10796-025-10601-6
Hao-Fan Chumg, Wen-Chin Tsao, Louise Cooke, Jonathan Seaton, I.-Hua Hung
{"title":"The Impact of Pluralistic Ignorance on Knowledge-Sharing Behaviour in Virtual Teams","authors":"Hao-Fan Chumg, Wen-Chin Tsao, Louise Cooke, Jonathan Seaton, I.-Hua Hung","doi":"10.1007/s10796-025-10601-6","DOIUrl":"https://doi.org/10.1007/s10796-025-10601-6","url":null,"abstract":"<p>Since Taiwan's economy is dominated by small and medium-sized enterprises, the formation of virtual teams is even more important for Taiwanese companies due to the impact of COVID- 19. Hence, this study draws on the virtual team climate and the theory of planned behaviour (TPB). However, it also adds pluralistic ignorance (which stems from social cognitive bias arising from universal behavioural adherence to social norms) as a key inhibitor to explore factors affecting the quantity and quality of knowledge-sharing behaviour through knowledge management systems (KMS) in virtual teams. A field survey of 528 employees from 72 companies in Taiwan and working in virtual teams was analysed utilising partial least squares structural equation modelling (PLS-SEM) to evaluate the outcomes empirically. The findings show that the virtual team climate, perceived behavioural control, and subjective norm still positively affect knowledge-sharing behaviour. However, more surprisingly, the moderating effect of pluralistic ignorance dampens the positive relationships between (1) the intention to share knowledge and knowledge-sharing behaviour and (2) the virtual team climate and knowledge-sharing behaviour within virtual teams. Finally, in addition to the practical implications for managers of knowledge-intensive companies who are keen to adopt virtual teams, this study provides several theoretical and managerial implications for relevant managers and academic researchers.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"62 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143920697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solution Path Algorithm for Double Margin Support Vector Machines 双边界支持向量机的解路径算法
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-05-05 DOI: 10.1007/s10796-025-10612-3
Guangrui Tang, Neng Fan
{"title":"Solution Path Algorithm for Double Margin Support Vector Machines","authors":"Guangrui Tang, Neng Fan","doi":"10.1007/s10796-025-10612-3","DOIUrl":"https://doi.org/10.1007/s10796-025-10612-3","url":null,"abstract":"<p>Data uncertainty is a challenging problem in machine learning. Distributionally robust optimization (DRO) can be used to model the data uncertainty. Based on DRO, a new support vector machines with double regularization terms and double margins can be derived. The proposed model can capture the data uncertainty in a probabilistic way and perform automatic feature selection for high dimensional data. We prove that the optimal solutions of this model change piecewise linearly with respect to the hyperparameters. Based on this property, we can derive the entire solution path by computing solutions only at the breakpoints. A solution path algorithm is proposed to efficiently identify the optimal solutions, thereby accelerating the hyperparameter tuning process. In computational efficiency experiments, the proposed solution path algorithm demonstrates superior performance compared to the CVXPY method and the Sequential Minimal Optimization (SMO) algorithm. Numerical experiments further confirm that the proposed model achieves robust performance even under noisy data conditions.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"115 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143910666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why do few Organizations Succeed while Others Fail? Impact of Organizational Capabilities and Barriers on Digital Government Transformation 为什么只有少数组织成功而其他组织却失败了?组织能力与障碍对数字化政府转型的影响
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-05-04 DOI: 10.1007/s10796-025-10603-4
Sandip Mukhopadhyay, Sumedha Chauhan, Manas Paul, Subhajit Bhattacharyya, Parijat Upadhyay, Shekhar Kumar Sinha
{"title":"Why do few Organizations Succeed while Others Fail? Impact of Organizational Capabilities and Barriers on Digital Government Transformation","authors":"Sandip Mukhopadhyay, Sumedha Chauhan, Manas Paul, Subhajit Bhattacharyya, Parijat Upadhyay, Shekhar Kumar Sinha","doi":"10.1007/s10796-025-10603-4","DOIUrl":"https://doi.org/10.1007/s10796-025-10603-4","url":null,"abstract":"<p>Government and public sector organizations focus on inclusiveness, transparency, security, and effectiveness. However, amid the ongoing deregulation and competition with private sectors, there are compulsions to leverage digital technologies for improving economic performance and customer satisfaction. In the above context, little is known about the role played by organizational capabilities in technology-led transformation of government. We employ SEM technique to validate our conceptual model that investigates the role of organizational capabilities on the degree of digitalization in the government organization and data for the same was collected from 196 government officials with relevant experience. The study found that effective digital strategy formulation increases employee digital capabilities and positively impacts digitalization in government. Vendor management capability is observed to mediate the relationship between digital strategy and digitalization in government while employee digital capability has an indirect impact through vendor management. Cultural and organizational barriers do not dampen the relationship between vendor management and digitalization in government. Our results integrate the dynamic capability framework with developments in digital transformation and technology sourcing literature.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"56 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143910665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Capital and Artificial Intelligence Readiness: The Mediating Role of Cyber Resilience and Value Construction of Smes in Resource-Constrained Environments 社会资本与人工智能准备:资源约束环境下中小企业网络弹性与价值构建的中介作用
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-04-30 DOI: 10.1007/s10796-025-10608-z
Egena Ode, Ifedapo Francis Awolowo, Rabake Nana, Femi Stephen Olawoyin
{"title":"Social Capital and Artificial Intelligence Readiness: The Mediating Role of Cyber Resilience and Value Construction of Smes in Resource-Constrained Environments","authors":"Egena Ode, Ifedapo Francis Awolowo, Rabake Nana, Femi Stephen Olawoyin","doi":"10.1007/s10796-025-10608-z","DOIUrl":"https://doi.org/10.1007/s10796-025-10608-z","url":null,"abstract":"<p>Drawing on social capital theory, this study explores the antecedents of AI readiness in Small and Medium-sized Enterprises (SMEs) operating in resource-constrained environments, emphasising capabilities that mitigate cyber risks, and foster value construction in SMEs. Specifically, the study examines how structural, cognitive, and relational social capital fosters cyber resilience and contributes to proactive value construction, enhancing SMEs’ AI readiness and enabling them to construct and sustain value while safeguarding against potential cyber threats. The study adopts a Covariance-based Structural Equation Modelling (CB-SEM) approach to analyse 589 valid responses. A multi-wave data strategy with an interval cross-lagged design was implemented to reduce the risk of common method bias. The findings reveal that structural and relational capital significantly drive AI readiness, while cognitive social capital enhances cyber resilience, which is pivotal in constructing and protecting organisational value. Moreover, cyber resilience mediates the relationship between cognitive social capital and AI readiness, and enabling value construction amid cyber-related disruptions. SMEs with robust social capital networks are better equipped to leverage AI technologies for innovation and growth, construct new value streams, and defend against cyber risks, securing value in dynamic digital environments. This study contributes to the growing discourse on cybersecurity and digital transformation by offering insights into how SMEs can bolster digital innovation and construct sustainable value in the face of mounting cyber risks.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"16 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143889987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Navigating AI Implementation in Local Government: Addressing Dilemmas by Fostering Mutuality and Meaningfulness 引导人工智能在地方政府的实施:通过促进相互性和意义来解决困境
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-04-28 DOI: 10.1007/s10796-025-10599-x
Emmi Heinisuo, Päivikki Kuoppakangas, Jari Stenvall
{"title":"Navigating AI Implementation in Local Government: Addressing Dilemmas by Fostering Mutuality and Meaningfulness","authors":"Emmi Heinisuo, Päivikki Kuoppakangas, Jari Stenvall","doi":"10.1007/s10796-025-10599-x","DOIUrl":"https://doi.org/10.1007/s10796-025-10599-x","url":null,"abstract":"<p>This study explores AI-enabled local public service provisioning, especially dilemmas of the mutual and meaningful development process. Theoretically, it builds on the current literature on AI implementation in the public sector and relates it to the theorisations of mutuality and meaningfulness. Empirically, it examines the experiences of public agents in a qualitative case study of chatbot development by the City of Oulu, Finland. The study concludes six factors that are constructed into three interconnected dilemma pairs to examine cross-cutting problematic decision-making scenarios and provide reconciliations through mutuality and meaningfulness.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"8 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143880836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable Within Behavioral Cybersecurity Research 找错对象了?行为网络安全研究中政策遵从性的因变量反思
IF 5.9 3区 管理学
Information Systems Frontiers Pub Date : 2025-04-28 DOI: 10.1007/s10796-025-10606-1
W. Alec Cram, John D’Arcy
{"title":"Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable Within Behavioral Cybersecurity Research","authors":"W. Alec Cram, John D’Arcy","doi":"10.1007/s10796-025-10606-1","DOIUrl":"https://doi.org/10.1007/s10796-025-10606-1","url":null,"abstract":"<p>A rich body of research examines the cybersecurity behavior of employees, with a particular focus on explaining the reasons why employees comply with (or violate) organizational cybersecurity policies. However, we posit that this emphasis on policy compliance is susceptible to several notable limitations that could lead to inaccurate research conclusions. In this research essay, we consider the limitations of using cybersecurity policy compliance as a dependent variable by presenting three assertions: (1) the link between policy compliance and organizational-level outcomes is ambiguous; (2) policies vary widely in terms of their clarity and completeness; and (3) employees have an inconsistent familiarity with their own organization’s cybersecurity policies. Taken together, we suggest that studying compliance with cybersecurity policies reveals only a partial picture of employee behavior. In response, we offer recommendations for future research.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"84 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143880834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信